RAPID7

Rapid7, Inc.

Application Filed: 2023-03-02
Trademark Application Details
Trademark Logo RAPID7
630
Live/Pending
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
Research OneLook Acronym Finder
Serial Number97819204
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NameChristina M. Licursi
Attorney Docket NumberR08692000000

Timeline

2005-04-30Date of First Use
2023-03-02Application Filed
2023-03-23Location: NEW APPLICATION PROCESSING
2023-03-23Status: Live/Pending
2023-03-23Transaction Date

Trademark Applicants & Owners

Owner: Rapid7, Inc.
Address120 Causeway Street, Suite 400 Boston DE 02114
Legal Entity TypeCorporation
Legal Entity StateDE

Documents

Application2023-03-02
Drawing2023-03-02
Specimen2023-03-02

Attorney of Record

CHRISTINA M. LICURSI
WOLF, GREENFIELD & SACKS, P.C.
600 ATLANTIC AVENUE
BOSTON, MA 02210

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:35
U.S. Codes:100,101,102
International Codes:37
U.S. Codes:100,103,106
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0371Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer, computer network and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; Inventory management services that enable companies and organizations to search for and organize information on their IT assets so they may assess their network and application vulnerabilities; computer system analysis services for installation of computer systems; Computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Development of software for secure network operations; Computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; Computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; Security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; Maintenance of computer software relating to computer security and prevention of computer risks; Downloadable software for analyzing source code; downloadable software for detecting and mitigating vulnerabilities in software code; downloadable software for detecting and reporting vulnerabilities in software code; Downloadable software and cloud-based software for managing the security posture of cloud resources and cloud-based devices; Downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable computer software for detecting fraudulent transactions and activities; downloadable computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable computer software for use in analyzing and monitoring computer networks; downloadable computer software for diagnosing industrial and business performance issues; downloadable computer software in the field of application analytics; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; downloadable data mining software; Providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting services in the field of information technology; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED2023-03-231 NWOS I:Incoming Correspondence
ASSIGNED TO EXAMINER2023-11-302 DOCK D:Assigned to Examiner
NON-FINAL ACTION WRITTEN2023-11-303 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2023-11-304 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2023-11-305 GNRN O:Outgoing Correspondence
APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED2024-02-286 XELR I:Incoming Correspondence
APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED2024-02-287 XELG O:Outgoing Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2024-05-308 TROA I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2024-05-309 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2024-05-3010 TEME I:Incoming Correspondence
NON-FINAL ACTION WRITTEN2024-06-2111 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2024-06-2112 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2024-06-2113 GNRN O:Outgoing Correspondence

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed