CONFIGSIEM Trademark

Trademark Overview


On Thursday, May 1, 2025, a trademark application was filed for CONFIGSIEM with the United States Patent and Trademark Office. The USPTO has given the CONFIGSIEM trademark a serial number of 99166338. The federal status of this trademark filing is RESPONSE AFTER NON-FINAL ACTION - ENTERED as of Friday, December 19, 2025. This trademark is owned by Innowate Inc.. The CONFIGSIEM trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Downloadable computer security software; downloadable computer software for analyzing information security configurations; downloadable computer software for analyzing and remediating information security configurations and controls; downloadable computer software for modifying computer network security, computer network device, and information security configurations; downloadable computer software for detecting information security configuration and control gaps; downloadable computer software for rigorous mathematical analysis of information security configuration and control gaps; downloadable computer software for remediation of information security configuration and control gaps; downloadable computer software for automated remediation of information security configuration and control gaps; downloadable computer software that protects businesses and customer data from malware and computer hackers; downloadable computer software for Internet security, computer security vulnerabili...

Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security consultancy; computer security threat analysis for protecting data; computer security consultancy in the field of computer virus and malware scanning software; computer security services in the nature of analyzing, generating, validating and verifying the configuration of IT assets; computer security services in the nature of finding gaps and recommending mitigations and remediations for enterprise-wide risk, compliance, assurance, and security management; computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to hard drives, computer networks, digital assets, and websites; computer security consultancy in the field of scanning and penetration testing o...
configsiem

General Information


Serial Number99166338
Word MarkCONFIGSIEM
Filing DateThursday, May 1, 2025
Status661 - RESPONSE AFTER NON-FINAL ACTION - ENTERED
Status DateFriday, December 19, 2025
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesDownloadable computer security software; downloadable computer software for analyzing information security configurations; downloadable computer software for analyzing and remediating information security configurations and controls; downloadable computer software for modifying computer network security, computer network device, and information security configurations; downloadable computer software for detecting information security configuration and control gaps; downloadable computer software for rigorous mathematical analysis of information security configuration and control gaps; downloadable computer software for remediation of information security configuration and control gaps; downloadable computer software for automated remediation of information security configuration and control gaps; downloadable computer software that protects businesses and customer data from malware and computer hackers; downloadable computer software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; downloadable computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing computer systems, computer and information security applications, and information security event data from computers and computer networks; downloadable computer software for use in transmitting and receiving computer systems, computer and information security applications, and information security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, and network attacks, and computer systems attacks, computer application attacks, computer network device attacks, information security systems attacks, information security application attacks and information security breaches; downloadable computer software for monitoring, analyzing, and reporting on event data from computers and computer networks for analysis and action by information security administrators or information security software; downloadable computer software for use in providing a secure connection for collection of information security configurations, logs and event data between computers, mobile devices, computer networks, and hosted security software; downloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission
Goods and ServicesCybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security consultancy; computer security threat analysis for protecting data; computer security consultancy in the field of computer virus and malware scanning software; computer security services in the nature of analyzing, generating, validating and verifying the configuration of IT assets; computer security services in the nature of finding gaps and recommending mitigations and remediations for enterprise-wide risk, compliance, assurance, and security management; computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to hard drives, computer networks, digital assets, and websites; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring computer security software; software as a service (SAAS) services featuring computer software for analyzing information security configurations; software as a service (SAAS) services featuring computer software for analyzing and remediating information security configurations and information security controls; software as a service (SAAS) services featuring computer software for analyzing network device configurations and network device controls; software as a service (SAAS) services featuring computer software for modifying computer network security, computer network device, and information security configurations; software as a service (SAAS) services featuring computer software for detecting information security configuration gaps and information security control gaps; software as a service (SAAS) services featuring computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps; software as a service (SAAS) services featuring computer software for remediation of information security configuration gaps and information security control gaps; software as a service (SAAS) services featuring computer software for automated remediation of information security configuration gaps and information security control gaps; software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and computer hackers software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and computer hackers; software as a service (SAAS) services featuring software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; software as a service (SAAS) services featuring software for use in collecting, filtering, normalizing, enriching, processing, and analyzing computer and information security systems, computer applications, and information security event data from computers and computer networks; Software as a service (SAAS) services featuring software for use in transmitting and receiving computer and information security systems, computer and information security applications, and information security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, network attacks, computer systems attacks, computer application attacks, computer network device attacks, information security application attacks and information security breaches; software as a service (SAAS) services featuring software for monitoring, analyzing, and reporting on information security event data from computers and computer networks for analysis and action by information security administrators or information security software; software as a service (SAAS) services featuring software for use in providing a secure connection for information security configurations, logs and information security event data between computers, mobile devices, computer networks, and hosted security software; software as a service (SAAS) services featuring software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission; providing online non-downloadable computer security software; providing online non-downloadable software for protecting businesses and customer data from malware and computer hackers; providing online non-downloadable software for Internet security, computer vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; providing online non-downloadable software for use in collecting, filtering, normalizing, enriching, processing, and analyzing computer systems, computer and information security applications, and information security event data from computers and computer networks; providing online non-downloadable software for use in transmitting and receiving system, application, and security event data from computers, computer networks, computer applications, computer network devices, information security systems, and information security applications for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, computer system attacks, computer application attacks, computer network device attacks, information security system attacks, and information security breaches; providing online non-downloadable software for monitoring, analyzing, and reporting on event data from computers and computer networks for information security analysis and action by information security administrators or security software; providing online non-downloadable software for use in providing a secure connection for information security logs, and information security event data between computers, mobile devices, computer networks, and hosted security software; providing online non-downloadable software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission; non-downloadable computer software for analyzing information security configurations; non-downloadable computer software for analyzing and remediating information security configurations and information security controls; non-downloadable computer software for modifying computer network security, computer network device, and information security configurations; non-downloadable computer software for detecting information security configuration gaps and information security control gaps; non-downloadable computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps; non-downloadable computer software for remediation of information security configuration gaps and information security control gaps; non-downloadable computer software for automated remediation of information security configuration gaps and information security control gaps

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, May 1, 2025
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, May 1, 2025
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameRIGOR AI INC.
Party Type11 - New Owner Before Publication
Legal Entity Type03 - Corporation
AddressSANTA CLARA, CA 95054

Party NameInnowate Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressSanta Clara, CA 95054

Trademark Events


Event DateEvent Description
Thursday, May 1, 2025NEW APPLICATION ENTERED
Thursday, May 1, 2025APPLICATION FILING RECEIPT MAILED
Wednesday, September 10, 2025NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Saturday, September 20, 2025ASSIGNED TO EXAMINER
Monday, September 22, 2025NON-FINAL ACTION WRITTEN
Monday, September 22, 2025NON-FINAL ACTION E-MAILED
Monday, September 22, 2025NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, December 10, 2025AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Friday, December 19, 2025TEAS RESPONSE TO OFFICE ACTION RECEIVED
Friday, December 19, 2025CORRESPONDENCE RECEIVED IN LAW OFFICE
Friday, December 19, 2025TEAS/EMAIL CORRESPONDENCE ENTERED