CONFIGSIEM Trademark

Trademark Overview


On Thursday, May 1, 2025, a trademark application was filed for CONFIGSIEM with the United States Patent and Trademark Office. The USPTO has given the CONFIGSIEM trademark a serial number of 99166338. The federal status of this trademark filing is APPROVED FOR PUBLICATION as of Friday, January 16, 2026. This trademark is owned by Innowate Inc.. The CONFIGSIEM trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security consultancy; computer network security consultancy; computer security consultancy in the field of computer virus and malware scanning software; computer security services in the nature of analyzing, generating, validating and verifying the configuration of IT assets; computer security services in the nature of finding gaps and recommending mitigations and remediations for enterprise-wide risk, compliance, assurance, and security management;  computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to hard drives, computer networks, digital assets, and websites; computer security consultancy in the field of scanning and penetration testing of computers an...

Downloadable computer security software; downloadable computer software for analyzing information security for purposes of configuration management; downloadable computer software for analyzing, restoring, and repairing information security for purposes of configuration management and information security controls; downloadable computer software for modifying computer network security, computer network device, and information security for purposes of configuration management; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for rigorous mathematical analysis of information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for rest...
configsiem

General Information


Serial Number99166338
Word MarkCONFIGSIEM
Filing DateThursday, May 1, 2025
Status680 - APPROVED FOR PUBLICATION
Status DateFriday, January 16, 2026
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesCybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security consultancy; computer network security consultancy; computer security consultancy in the field of computer virus and malware scanning software; computer security services in the nature of analyzing, generating, validating and verifying the configuration of IT assets; computer security services in the nature of finding gaps and recommending mitigations and remediations for enterprise-wide risk, compliance, assurance, and security management;  computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to hard drives, computer networks, digital assets, and websites; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;  software as a service (SAAS) services featuring computer security software; software as a service (SAAS) services featuring computer software for analyzing information security for the purpose of configuration management; software as a service (SAAS) services featuring computer software for analyzing, repairing, and restoring information security for the purpose of configuration management and information security controls; software as a service (SAAS) services featuring computer software for modifying computer network security, computer network device, and information security configurations for the purpose of configuration management; software as a service (SAAS) services featuring computer software for detecting information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring computer software for repairing and restoring information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities;  software as a service (SAAS) services featuring computer software for automated repair and restoration of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and computer hackers; software as a service (SAAS) services featuring software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions;  software as a service (SAAS) services featuring software for use in collecting, , processing, and analyzing cybersecurity event data from computer systems, information security systems, computer applications, computer network devices, information security applications, and information security event data, namely, data from cybersecurity events; Software as a service (SAAS) services featuring software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems, and information security applications,  all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, network security attacks, computer systems attacks, computer application attacks, computer network device attacks, information security application attacks and information security breaches; software as a service (SAAS) services featuring software for monitoring, analyzing, and reporting on information security event data, namely, data from cybersecurity events, from computers and computer networks for analysis and action by information security administrators or information security software; software as a service (SAAS) services featuring software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for transmission of information security configurations, logs and information security event data, namely, data from cybersecurity events; software as a service (SAAS) services featuring software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission, namely, transmission of data from cybersecurity events; providing online non-downloadable computer security software; providing online non-downloadable software for protecting businesses and customer data from malware and computer hackers; providing online non-downloadable software for Internet security, computer vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; providing online non-downloadable software for use in collecting, , processing, and analyzing cybersecurity event data from computer systems, computer applications, computer network devices, information security systems, and information security applications; providing online non-downloadable software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems, and information security applications, all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, computer system attacks, computer application attacks, computer network device attacks, information security system attacks, and information security breaches; providing online non-downloadable software for monitoring, analyzing, and reporting on cybersecurity event data from computers and computer networks for information security analysis and action by information security administrators or security software; providing online non-downloadable software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for transmission of information security logs and information security event data, namely, data from cybersecurity events; providing online non-downloadable software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer cybersecurity event transmission, namely, transmission of data from cybersecurity events; non-downloadable computer software for analyzing information security for the purpose of configuration management; non-downloadable computer software for analyzing, repairing, and restoring information security for the purpose of configuration management and information security controls;  non-downloadable computer software for modifying computer network security, computer network device, and information security for the purpose of configuration management; non-downloadable computer software for detecting information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; non-downloadable computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities;  non-downloadable computer software for repairing and restoring  information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; non-downloadable computer software for automated repairing and restoring information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities
Goods and ServicesDownloadable computer security software; downloadable computer software for analyzing information security for purposes of configuration management; downloadable computer software for analyzing, restoring, and repairing information security for purposes of configuration management and information security controls; downloadable computer software for modifying computer network security, computer network device, and information security for purposes of configuration management; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for rigorous mathematical analysis of information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for restoring and repairing information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for automated repair and restoration of information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software that protects businesses and customer data from malware and computer hackers;  downloadable computer software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; downloadable computer software for use in collecting, processing, and analyzing cybersecurity event data from computer systems, computer applications, computer network devices, and information security applications; downloadable computer software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems and information security applications, all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, network security attacks, computer systems attacks, computer application attacks, computer network device attacks, information security systems attacks, information security application attacks and information security breaches; downloadable computer software for monitoring, analyzing, and reporting on cybersecurity event data from computers and computer networks for analysis and action by information security administrators or information security software;  downloadable computer software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for collection of information security configurations, logs and cybersecurity event data ; downloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission, namely, transmission of data from cybersecurity events

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, May 1, 2025
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, May 1, 2025
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameRIGOR AI INC.
Party Type11 - New Owner Before Publication
Legal Entity Type03 - Corporation
AddressSANTA CLARA, CA 95054

Party NameInnowate Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressSanta Clara, CA 95054

Trademark Events


Event DateEvent Description
Thursday, May 1, 2025NEW APPLICATION ENTERED
Thursday, May 1, 2025APPLICATION FILING RECEIPT MAILED
Wednesday, September 10, 2025NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Saturday, September 20, 2025ASSIGNED TO EXAMINER
Monday, September 22, 2025NON-FINAL ACTION WRITTEN
Monday, September 22, 2025NON-FINAL ACTION E-MAILED
Monday, September 22, 2025NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, December 10, 2025AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Friday, December 19, 2025TEAS RESPONSE TO OFFICE ACTION RECEIVED
Friday, December 19, 2025CORRESPONDENCE RECEIVED IN LAW OFFICE
Friday, December 19, 2025TEAS/EMAIL CORRESPONDENCE ENTERED
Friday, January 16, 2026EXAMINERS AMENDMENT -WRITTEN
Friday, January 16, 2026EXAMINERS AMENDMENT E-MAILED
Friday, January 16, 2026NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Friday, January 16, 2026EXAMINER'S AMENDMENT ENTERED
Friday, January 16, 2026APPROVED FOR PUB - PRINCIPAL REGISTER