Trademark Overview
On Monday, June 12, 2023, a trademark application was filed for CONTROL COMPLEXITY with the United States Patent and Trademark Office. The USPTO has given the CONTROL COMPLEXITY trademark a serial number of 98038496. The federal status of this trademark filing is NOTICE OF ALLOWANCE - ISSUED as of Tuesday, June 4, 2024. This trademark is owned by Axonius Solutions Ltd.. The CONTROL COMPLEXITY trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:
Downloadable software for security and compliance automation, continuously monitoring and collecting evidence of a company's security controls, and streamlining workflows to ensure audit-readiness; Downloadable computer software for computer network security and for monitoring and identifying computer network users and cloud, mobile or network applications and computer hardware and the network activities of computer users and cloud, mobile or network applications and computer hardware; Downloadable and recorded computer software and computer hardware for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; Downloadable computer software for providing data and information assurance and security, information security policy validation and enforcement; Downloadable software for computer network security; Downloadable computer software for management of physical and virtual devices connected to a network for the detection of unauthorized acce...
Software as a service (SAAS) services featuring software for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; Computer security support services; Software as a service services (SaaS) featuring software for monitoring, analyzing, auditing, automating, identification, discovery, centralization, unification, management, optimization, integration, and security of users, actions, data, software and files; Software as a service services (SaaS) featuring software for identifying and reporting security threats, automating remediation on breaches of security policies, enforcing security policies, eliminating security vulnerabilities, security compliance monitoring, managing access rights and providing alerts and notifications; Design, development and implementation of software in the field of data and network security; design, development and implementation of software in the fields of cloud, mobile or network applications; information techno...