Trademark Overview
On Thursday, December 28, 2023, a trademark application was filed for BEDEL SECURITY with the United States Patent and Trademark Office. The USPTO has given the BEDEL SECURITY trademark a serial number of 98333327. The federal status of this trademark filing is NON-FINAL ACTION - MAILED as of Thursday, August 1, 2024. This trademark is owned by Bedel Technology, LLC. The BEDEL SECURITY trademark is filed in the Advertising, Business and Retail Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:
Consulting services in the field of cybersecurity risk management and information security program training; Providing education to help organizations manage cybersecurity and information security programs
Strategic advisory services, namely, providing methodologies, templates, technologies, and platforms used to build and maintain an information security program; Cyber risk strategic advisory services, namely, computer security; Business risk assessment services; Business consulting services in the fields of cyber risk management, risk analysis, compliance with security, privacy, breach notification statutes and regulations, and information security; Providing assessments of information security programs; Providing services and tool to help organizations manage cybersecurity and information security programs; Advisory services in the field of planning, design, operation, and management of information security programs, privacy, and cyber risk management
Technology consultation in the field of cybersecurity; Computer security consultancy in the areas of planning, design, and management of information security programs, privacy, and cyber risk management; Computer security consultancy, namely, virtual chief information security officer services; Computer security consultancy, namely, vCISO services; Management of information security programs; Providing computer information security assessments regarding cybersecurity controls, governance structure, policies, incident response plans and preparedness, business continuity plans, cyber monitoring capabilities, risk assessment, legal and regulatory compliance, vendor management, audit and penetration testing scope and results, and user awareness