Trademark/Service Mark Application, Principal Register
PTO- 1478
Approved for use through 06/30/2021. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number
Trademark/Service Mark Application, Principal Register
The mark consists of standard characters, without claim to any particular font style, size, or color.
REGISTER
Principal
APPLICANT INFORMATION
*OWNER OF MARK
Stairwell, Inc.
*MAILING ADDRESS
500 University Avenue
*CITY
Palo Alto
*STATE
(Required for U.S. applicants)
California
*COUNTRY/REGION/JURISDICTION/U.S. TERRITORY
United States
*ZIP/POSTAL CODE
(Required for U.S. and certain international addresses)
94301
*EMAIL ADDRESS
XXXX
LEGAL ENTITY INFORMATION
TYPE
corporation
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY OF INCORPORATION
Delaware
GOODS AND/OR SERVICES AND BASIS INFORMATION
INTERNATIONAL CLASS
009
*IDENTIFICATION
downloadable and recorded computer software for providing computer security; downloadable and recorded computer software used to maintain
security over or in computer networks, web applications and/or digital data; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management,
remediation, and elimination; downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning, detection, identification,
security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and electronic devices;
downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers,
data, and electronic devices; downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for constant
cybersecurity monitoring; downloadable and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and recorded
computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded computer
software for integrating employees' awareness, including employees' behavioral response patterns; downloadable and recorded computer software for providing real-time, on-demand comprehensive
configuration and vulnerability assessments; downloadable and recorded computer software restricting unauthorized access to computer systems as part of information security management downloadable
and recorded computer software for cybersecurity and computer security; downloadable and recorded computer software for use in preventing unauthorized access to and misuse of computer systems,
identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; downloadable and recorded
computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer; downloadable and recorded computer security software for assessing and
quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable and recorded computer software, namely, software for data gathering, storage,
manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education
pertaining to information, computer and internet security; downloadable and recorded computer software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident
response; downloadable and recorded computer and information security software; downloadable and recorded computer software for managing security strategy and resources relating to the security risk
industry; downloadable and recorded computer programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded predictive computer and network
vulnerability management software; downloadable and recorded computer malware incident forensics software; downloadable and recorded cybersecurity incident response software; downloadable and
recorded computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for
detecting unauthorized access or data breach; downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded
computer software for detection and prevention of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security
software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive
network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
FILING BASIS
SECTION 1(b)
INTERNATIONAL CLASS
042
*IDENTIFICATION
software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for providing computer security;
software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software used to maintain security over or in computer networks, web applications and/or digital data;
software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and
elimination; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded anti-virus software; application service provider featuring software for providing
anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer
systems, servers and electronic devices; providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and
elimination for protecting computer hardware, systems, servers, data, and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded
cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; software as a service (SaaS) services featuring software for calculating
and simulating security breaches while providing suggestions to protect cybersecurity; software as a service (SaaS) services featuring software for collecting relevant configuration details through
agents continuously monitoring the entire fleet of digital assets on a real-time basis; software as a service (SaaS) services featuring software for integrating employees' awareness, including
employees' behavioral response patterns; software as a service (SaaS) services featuring software for providing real-time, on-demand comprehensive configuration and vulnerability assessments;
software as a service (SaaS) services featuring software restricting unauthorized access to computer systems as part of information security management; software as a service (SaaS) services
featuring software, configurations and controls for cybersecurity and computer security; software as a service (SaaS) services, featuring software, configurations and controls for use in preventing
unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and
identifying malicious websites; software as a service (SaaS) services featuring software for cybersecurity monitoring and control of network activities on a computer; software as a service (SaaS)
services featuring software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; computer services, namely, providing forensic
services to recover lost and deleted data; computer services, namely, monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) services featuring
software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; software as a service (SaaS) services featuring computer and information security software;
software as a service (SaaS) services featuring software for managing security strategy and resources relating to the security risk industry; software as a service (SaaS) services featuring software
for managing security strategy and resources for use in the security risk industry; software as a service (SaaS) services featuring predictive computer and network vulnerability management software;
software as a service (SaaS) services featuring malware incident forensics software; software as a service (SaaS) services featuring cybersecurity incident response software; software as a service
(SaaS) services featuring software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; software as a service (SaaS) services featuring computer and internet
security software, computer antivirus software, and anti-malware software; software as a service (SaaS) services featuring software for computer, data and network security; software as a service
(SaaS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a
service (SaaS) featuring software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic
data, and cybersecurity management
FILING BASIS
SECTION 1(b)
ATTORNEY INFORMATION
NAME
David A.W. Wong
ATTORNEY DOCKET NUMBER
83882-342966
ATTORNEY BAR MEMBERSHIP NUMBER
XXX
YEAR OF ADMISSION
XXXX
U.S. STATE/ COMMONWEALTH/ TERRITORY
XX
FIRM NAME
Barnes & Thornburg LLP
STREET
11 South Meridian Street
CITY
Indianapolis
STATE
Indiana
COUNTRY/REGION/JURISDICTION/U.S. TERRITORY
United States
ZIP/POSTAL CODE
46204-3535
PHONE
317-236-1313
FAX
317-231-7433
EMAIL ADDRESS
dwong@btlaw.com
OTHER APPOINTED ATTORNEY
All attorneys at law with the law firm of Barnes & Thornburg LLP
CORRESPONDENCE INFORMATION
NAME
David A.W. Wong
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE
dwong@btlaw.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES)
TMINDocket@btlaw.com; cbrinson@btlaw.com
FEE INFORMATION
APPLICATION FILING OPTION
TEAS Standard
NUMBER OF CLASSES
2
APPLICATION FOR REGISTRATION PER CLASS
350
*TOTAL FEES DUE
700
*TOTAL FEES PAID
700
SIGNATURE INFORMATION
SIGNATURE
/Jan Kang/
SIGNATORY'S NAME
Jan Kang
SIGNATORY'S POSITION
COO + General Counsel
DATE SIGNED
06/29/2021
SIGNATURE METHOD
Sent to third party for signature
PTO- 1478
Approved for use through 06/30/2021. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number
Trademark/Service Mark Application, Principal Register
Serial Number:90801520
Filing Date:06/29/2021
To the Commissioner for Trademarks:
MARK: SWELL (Standard Characters, see mark)
The literal element of the mark consists of SWELL. The mark consists of standard characters, without claim to any particular font style, size, or color.
The applicant, Stairwell, Inc., a corporation of Delaware, having an address of
500 University Avenue
Palo Alto, California 94301
United States
XXXX
requests registration of the trademark/service mark identified above in the United States Patent and Trademark Office on the Principal Register established by the Act of July 5, 1946 (15 U.S.C.
Section 1051 et seq.), as amended, for the following:
International Class 009: downloadable and recorded computer software for providing computer security; downloadable and recorded computer software used to maintain security over or in computer
networks, web applications and/or digital data; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination;
downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning, detection, identification, security, management, remediation,
and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and electronic devices; downloadable and recorded computer
software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices;
downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; downloadable
and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and recorded computer software for collecting
relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded computer software for integrating employees'
awareness, including employees' behavioral response patterns; downloadable and recorded computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments;
downloadable and recorded computer software restricting unauthorized access to computer systems as part of information security management downloadable and recorded computer software for
cybersecurity and computer security; downloadable and recorded computer software for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms,
trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; downloadable and recorded computer security software, namely,
software for cybersecurity monitoring and control of network activities on a computer; downloadable and recorded computer security software for assessing and quantifying digital security risks,
threats, hacks, and data leakage across networks for cybersecurity; downloadable and recorded computer software, namely, software for data gathering, storage, manipulation, management and encryption,
and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet
security; downloadable and recorded computer software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; downloadable and recorded computer and
information security software; downloadable and recorded computer software for managing security strategy and resources relating to the security risk industry; downloadable and recorded computer
programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded predictive computer and network vulnerability management software; downloadable
and recorded computer malware incident forensics software; downloadable and recorded cybersecurity incident response software; downloadable and recorded computer software for assessing vulnerability,
preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for detecting unauthorized access or data breach;
downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded computer software for detection and prevention
of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security software for automatically identifying and
sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive network security, intrusion prevention,
event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.
International Class 042: software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for providing computer security; software as a service (SaaS),
namely, providing temporary use of non-downloadable and recorded software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS),
namely, providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination; software as a service
(SaaS), namely, providing temporary use of non-downloadable and recorded anti-virus software; application service provider featuring software for providing anti-virus scanning, detection,
identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic
devices; providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer
hardware, systems, servers, data, and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded cybersecurity software tools for assessing the
vulnerability of computer networks and for constant cybersecurity monitoring; software as a service (SaaS) services featuring software for calculating and simulating security breaches while providing
suggestions to protect cybersecurity; software as a service (SaaS) services featuring software for collecting relevant configuration details through agents continuously monitoring the entire fleet of
digital assets on a real-time basis; software as a service (SaaS) services featuring software for integrating employees' awareness, including employees' behavioral response patterns; software as a
service (SaaS) services featuring software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; software as a service (SaaS) services featuring software
restricting unauthorized access to computer systems as part of information security management; software as a service (SaaS) services featuring software, configurations and controls for cybersecurity
and computer security; software as a service (SaaS) services, featuring software, configurations and controls for use in preventing unauthorized access to and misuse of computer systems, identifying
and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; software as a service (SaaS) services
featuring software for cybersecurity monitoring and control of network activities on a computer; software as a service (SaaS) services featuring software for assessing and quantifying digital
security risks, threats, hacks, and data leakage across networks for cybersecurity; computer services, namely, providing forensic services to recover lost and deleted data; computer services, namely,
monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software for automated cybersecurity, digital forensics, cyber threat
intelligence, and incident response; software as a service (SaaS) services featuring computer and information security software; software as a service (SaaS) services featuring software for managing
security strategy and resources relating to the security risk industry; software as a service (SaaS) services featuring software for managing security strategy and resources for use in the security
risk industry; software as a service (SaaS) services featuring predictive computer and network vulnerability management software; software as a service (SaaS) services featuring malware incident
forensics software; software as a service (SaaS) services featuring cybersecurity incident response software; software as a service (SaaS) services featuring software for assessing vulnerability,
preventing and addressing cybersecurity threats and attacks; software as a service (SaaS) services featuring computer and internet security software, computer antivirus software, and anti-malware
software; software as a service (SaaS) services featuring software for computer, data and network security; software as a service (SaaS) services featuring computer security software for
automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a service (SaaS) featuring software for comprehensive network
security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.
The owner's/holder's proposed attorney information: David A.W. Wong. Other appointed attorneys are All attorneys at law with the law firm of Barnes & Thornburg LLP. David A.W. Wong of Barnes
& Thornburg LLP, is a member of the XX bar, admitted to the bar in XXXX, bar membership no. XXX, and the attorney(s) is located at
11 South Meridian Street
Indianapolis, Indiana 46204-3535
United States
317-236-1313(phone)
317-231-7433(fax)
dwong@btlaw.com
The docket/reference number is 83882-342966.
David A.W. Wong submitted the following statement: The attorney of record is an active member in good standing of the bar of the highest court of a U.S. state, the District of Columbia, or any U.S.
Commonwealth or territory.
The applicant's current Correspondence Information:
Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the applicant owner/holder and the applicant owner's/holder's attorney, if appointed,
and that all official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).
A fee payment in the amount of $700 has been submitted with the application, representing payment for 2 class(es).
Declaration
Declaration Signature
Signature: /Jan Kang/ Date: 06/29/2021
Signatory's Name: Jan Kang
Signatory's Position: COO + General Counsel
Signatory's Phone Number: Not Provided
Signature method: Sent to third party for signature
Payment Sale Number: 90801520
Payment Accounting Date: 06/29/2021
Serial Number: 90801520
Internet Transmission Date: Tue Jun 29 15:53:36 ET 2021
TEAS Stamp: USPTO/BAS-X.X.XXX.XXX-202106291553369625
10-90801520-780d33ce861c57bd746099f02e71
4dda4e56ee422a6155cbf0ec63658835815c-CC-
53320617-20210629081203121323