SNIPER

CyberActive Technologies LLC

Application Filed: 2021-12-07
Trademark Application Details
Trademark Logo SNIPER

Mark For: SNIPER™ trademark registration is intended to cover the categories of software as a service (SAAS) for internet security; software as a service (SAAS) for enterprise security; software as a service (SAAS) for computer network security and network traffic analysis; software as a service (SAAS) for collecting and transmitting cyber-security related telemetry; software as a service (SAAS) for enforcement of computer security policies; software as a service (SAAS) for prevention and disruption of malicious activity; software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; Software as a service (SAAS) for security analysis of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; Software as a service (SAAS) for analysis of tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; Software as a service (SAAS) for computer and network system detection defenses, offenses, and prevention of compromise, pre-, and post-compromise; Software as a service (SAAS) for network defense and offense of compromise, pre-, and post-compromise tactics; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, detection, analysis, and response to compromise, malicious activity, malware, and zero-day exploits. [all]

Status

2021-12-11 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.


Website cyberactive.com whois domain owner info
Research OneLook Acronym Finder
Serial Number97161225
Mark Literal ElementsSNIPER
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeSERVICE MARK
RegisterPRINCIPAL
Current LocationNEW APPLICATION PROCESSING 2021-12-10
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo

Timeline

2021-12-06Date of First Use
2021-12-06Date of Use In Commerce
2021-12-07Application Filed
2021-12-10Location: NEW APPLICATION PROCESSING
2021-12-10Status: Live/Pending
2021-12-10Status: New application will be assigned to an examining attorney approximately 6 months after filing date.
2021-12-10Transaction Date

Trademark Parties (Applicants & Owners)

Party: CyberActive Technologies LLC
Address2055 Limestone Road STE 200-C Wilmington, DELAWARE UNITED STATES 19808
Legal Entity TypeLimited Liability Company
Legal Entity StateDELAWARE

Documents

Application2021-12-07
Drawing2021-12-07
Specimen2021-12-07

Attorney of Record

CYBERACTIVE TECHNOLOGIES LLC
2055 LIMESTONE ROAD STE 200-C
WILMINGTON, DE 19808


Good, Services, and Codes


IC 042. US 100 101. G & S: Software as a service (SAAS) for internet security; software as a service (SAAS) for enterprise security; software as a service (SAAS) for computer network security and network traffic analysis; software as a service (SAAS) for collecting and transmitting cyber-security related telemetry; software as a service (SAAS) for enforcement of computer security policies; software as a service (SAAS) for prevention and disruption of malicious activity; software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; Software as a service (SAAS) for security analysis of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; Software as a service (SAAS) for analysis of tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; Software as a service (SAAS) for computer and network system detection defenses, offenses, and prevention of compromise, pre-, and post-compromise; Software as a service (SAAS) for network defense and offense of compromise, pre-, and post-compromise tactics; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, detection, analysis, and response to compromise, malicious activity, malware, and zero-day exploits. FIRST USE: 20211206. FIRST USE IN COMMERCE: 20211206

International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Software as a service (SAAS) for internet security; software as a service (SAAS) for enterprise security; software as a service (SAAS) for computer network security and network traffic analysis; software as a service (SAAS) for collecting and transmitting cyber-security related telemetry; software as a service (SAAS) for enforcement of computer security policies; software as a service (SAAS) for prevention and disruption of malicious activity; software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; Software as a service (SAAS) for security analysis of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; Software as a service (SAAS) for analysis of tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; Software as a service (SAAS) for computer and network system detection defenses, offenses, and prevention of compromise, pre-, and post-compromise; Software as a service (SAAS) for network defense and offense of compromise, pre-, and post-compromise tactics; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, detection, analysis, and response to compromise, malicious activity, malware, and zero-day exploits

Trademark Filing History

DescriptionDateProceeding Number
NEW APPLICATION ENTERED IN TRAM2021-12-10

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed