OVERWATCH - Trademark Details
Status: 605 - Abandoned - After Publication
Serial Number
87492744
Word Mark
OVERWATCH
Status
605 - Abandoned - After Publication
Status Date
2018-02-17
Filing Date
2017-06-16
Mark Drawing
4000 - Standard character mark
Typeset
Published for Opposition Date
2017-12-19
Attorney Name
Law Office Assigned Location Code
L90
Employee Name
GOODMAN, WENDY BETH
Statements
Goods and Services
Downloadable and installable computer software, namely, agent software for cybersecurity monitoring and control of activities on a computer, antivirus software, simulation software used in the field of enterprise cybersecurity, graph-based database software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, kernel-level software for preventing actions by malware, malware incident forensics software, malware incident remediation software, rules-based decision support software used in the field of enterprise cybersecurity, neural network software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, temporal event capture, management, and analysis software used in the field of enterprise cybersecurity, risk quantification, mitigation, and management software, cyber decision platform software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, software for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents in the field of enterprise cybersecurity, and business analytics software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity
Goods and Services
Providing software as a service (SaaS) services featuring software for cybersecurity monitoring and control of activities on a computer, antivirus scanning, computer virus characterization, remediation, and elimination, simulating large-scale processes in the field of enterprise cybersecurity, providing large-scale graph-based database services used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, providing malware incident forensics services, providing malware incident remediation services, providing rules-based decision support services in the field of enterprise cybersecurity, providing neural networks for use in analytics and planning in the field of enterprise cybersecurity, providing temporal event capture, analysis, and management services in the field of enterprise cybersecurity, providing risk quantification, mitigation, and management services in the field of enterprise cybersecurity, providing cyber decision platform services in the field of enterprise cybersecurity; providing services for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents, and providing business analytics functionality for the purpose of data-driven decision making and predictive analytics in the field of enterprise cybersecurity; providing professional consulting services pertaining to the deployment, configuration and optimization of software delivered from the cloud or deployed locally, namely, software for cybersecurity monitoring and control of activities on a computer, antivirus software, simulation software used in the field of enterprise cybersecurity, graph-based database software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, kernel-level software for preventing actions by malware, malware incident forensics software, malware incident remediation software, rules-based decision support software used in the field of enterprise cybersecurity, neural network software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, temporal event capture, management, and analysis software used in the field of enterprise cybersecurity, risk quantification, mitigation, and management software, cyber decision platform software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, software for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents in the field of enterprise cybersecurity, and business analytics software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity
Pseudo Mark
OVER WATCH
Classification Information
International Class
009 - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus. - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
US Class Codes
021, 023, 026, 036, 038
Class Status Code
8 - Abandoned
Class Status Date
2018-02-17
Primary Code
009
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
8 - Abandoned
Class Status Date
2018-02-17
Primary Code
042
Correspondences
Name
Brian S. Boon
Address
Please log in with your Justia account to see this address.
Trademark Events
Event Date | Event Description |
2017-06-20 | NEW APPLICATION ENTERED IN TRAM |
2017-06-22 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM |
2017-09-14 | ASSIGNED TO EXAMINER |
2017-09-28 | EXAMINERS AMENDMENT -WRITTEN |
2017-09-28 | EXAMINERS AMENDMENT E-MAILED |
2017-09-28 | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED |
2017-09-28 | EXAMINER'S AMENDMENT ENTERED |
2017-11-01 | APPROVED FOR PUB - PRINCIPAL REGISTER |
2017-11-12 | ASSIGNED TO LIE |
2017-11-29 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
2017-12-19 | PUBLISHED FOR OPPOSITION |
2017-12-19 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
2018-01-16 | EXTENSION OF TIME TO OPPOSE RECEIVED |
2018-01-27 | TEAS POST PUBLICATION AMENDMENT RECEIVED |
2018-02-09 | ASSIGNED TO PETITION STAFF |
2018-02-17 | ABANDONMENT - AFTER PUBLICATION |
2018-02-17 | CHANGES/CORRECTIONS AFTER PUB APPROVAL ENTERED |
2018-02-20 | ABANDONMENT NOTICE MAILED - AFTER PUBLICATION |
2018-08-05 | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED |
2018-08-05 | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED |
2019-10-18 | TEAS CHANGE OF CORRESPONDENCE RECEIVED |
2019-11-14 | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED |
2019-11-14 | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED |
2020-08-19 | TEAS CHANGE OF OWNER ADDRESS RECEIVED |
2020-08-19 | TEAS CHANGE OF CORRESPONDENCE RECEIVED |
2020-08-19 | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED |