DISRUPT. DEFEND. UNITE. Trademark

Trademark Overview


On Tuesday, February 2, 2016, a trademark application was filed for DISRUPT. DEFEND. UNITE. with the United States Patent and Trademark Office. The USPTO has given the DISRUPT. DEFEND. UNITE. trademark a serial number of 86894536. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, March 20, 2017. This trademark is owned by Carbon Black, Inc.. The DISRUPT. DEFEND. UNITE. trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monit...
disrupt. defend. unite.

General Information


Serial Number86894536
Word MarkDISRUPT. DEFEND. UNITE.
Filing DateTuesday, February 2, 2016
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, March 20, 2017
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, June 21, 2016

Trademark Statements


Goods and ServicesComputer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, mobile phones and portable and handheld electronic devices, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateFriday, February 5, 2016
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameCarbon Black, Inc.
Party Type20 - Owner at Publication
Legal Entity Type03 - Corporation
AddressWaltham, MA 02451

Party NameCarbon Black, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressWaltham, MA 02451

Trademark Events


Event DateEvent Description
Monday, March 20, 2017ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED
Monday, March 20, 2017ABANDONMENT - NO USE STATEMENT FILED
Thursday, January 5, 2017TEAS CHANGE OF CORRESPONDENCE RECEIVED
Tuesday, August 16, 2016NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, June 21, 2016OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, June 21, 2016PUBLISHED FOR OPPOSITION
Wednesday, June 1, 2016NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Wednesday, May 18, 2016APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, May 18, 2016ASSIGNED TO EXAMINER
Friday, March 18, 2016TEAS CHANGE OF CORRESPONDENCE RECEIVED
Friday, February 5, 2016NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Friday, February 5, 2016NEW APPLICATION ENTERED IN TRAM