KASEYA 365

Kaseya Us Llc

Application Filed: 2024-04-29
Trademark Application Details
Trademark Logo KASEYA 365
630
Live/Pending
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
Research OneLook Acronym Finder
Serial Number98525484
Mark Drawing Code4: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NamePaul G. Johnson
Attorney Docket NumberK4051.83422U

Timeline

2024-04-29Application Filed
2024-04-29Status: Live/Pending
2024-04-29Transaction Date

Trademark Applicants & Owners

Owner: KASEYA US LLC
Address701 Brickell Avenue, Suite 400 Miami DE 33131
US
Legal Entity TypeLimited Liability Company
Legal Entity StateDE US

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

Paul G. JohnsonMaschoff Brennan
Suite 3001389 Center Drive
Park City,UT
84098
United States

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0091Downloadable enterprise software used to track and improve the performance and availability of business services from an information technology operations perspective; Computer software, namely, downloadable application software for use in accessing a platform featuring software for use in managing business processes; Downloadable computer software for enterprise application integration (EAI); Downloadable computer software for application and database integration; Downloadable computer software for management of computer-based information systems and networks for businesses; Downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems, networks, and applications; Downloadable computer software for workflow and business process automation; Downloadable computer software for information technology service automation; Downloadable computer software for identifying elements of information technology infrastructure; Downloadable computer software for generating performance analytics; Downloadable computer software for facilities management; Downloadable computer software for field service automation; Downloadable computer software for application integration; Downloadable computer software development tools; Downloadable computer software for ensuring the security and backup of electronic mail; Downloadable anti-spyware software; Downloadable computer software for controlling and managing access server applications; Downloadable computer software for the creation of firewalls; Downloadable computer anti-virus software; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Computer software for backup, restoration and storage of computer data, electronic data and endpoints locally and in remote locations; Computer software for managing both local and remote automated data backup and storage; Downloadable computer software for risk and vulnerability analysis and security for computers, computer systems, computer networks and endpoint devices; Downloadable computer software for data and file sharing, syncing and storage; Downloadable computer software for vulnerability scanning and penetration testing of computers, networks and endpoints to assess information security vulnerabilities; Downloadable anti-phishing computer software; Downloadable computer software for managed security operations, namely, for malicious website detection, for monitoring, detecting and responding to threats across computers, endpoints, networks and cloud attack vectors; Downloadable computer networking software; Downloadable software for providing security awareness training in the field of computers, electronic data and the Internet; Downloadable patch software and user authentication software; Downloadable computer software for network assessements; Downloadable computer software for cyber security threat detection, scanning, alerting and resolution; Downloadable computer software for compliance; Downloadable computer software for remotely monitoring and managing computer systems, applications and devices; Downloadable computer software for monitoring of public records and anonymous, hidden, or encrypted networks and sites on the internet for the unauthorized presence of organizations' data, information and credentials indicating potential cybersecurity breaches, facilitating the detection and prevention of theft and fraud of organizational data, information and credentials, and providing reports to such organizations related thereto

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED2024-04-291 NWAP I:Incoming Correspondence

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed