GUTSY Trademark

Trademark Overview


On Monday, April 17, 2023, a trademark application was filed for GUTSY with the United States Patent and Trademark Office. The USPTO has given the GUTSY trademark a serial number of 97892484. The federal status of this trademark filing is FINAL REFUSAL - MAILED as of Friday, June 7, 2024. This trademark is owned by XT Security Ltd.. The GUTSY trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Cloud data security services, namely, computer security services, namely, measuring, analyzing, monitoring, and providing governance for security processes ; Cloud-based, cloud-stored and cloud-hosted data protection and security services, namely, security log and event files, ticketing data, identity management data, endpoint data, network data, and other data from systems used in security processes ; Software and cyber web security services for risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security functions; Software as a service (SAAS) services, namely, providing an online non-downloadable software platform for risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security functions, namely, providing an online non-downloadable cloud security platform featuring software for use in assisting in the ability to vi...
gutsy

General Information


Serial Number97892484
Word MarkGUTSY
Filing DateMonday, April 17, 2023
Status645 - FINAL REFUSAL - MAILED
Status DateFriday, June 7, 2024
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesCloud data security services, namely, computer security services, namely, measuring, analyzing, monitoring, and providing governance for security processes ; Cloud-based, cloud-stored and cloud-hosted data protection and security services, namely, security log and event files, ticketing data, identity management data, endpoint data, network data, and other data from systems used in security processes ; Software and cyber web security services for risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security functions; Software as a service (SAAS) services, namely, providing an online non-downloadable software platform for risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security functions, namely, providing an online non-downloadable cloud security platform featuring software for use in assisting in the ability to visualize, analyze and optimize security processes; Technical support services, namely, providing technology consultation for risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security functions; Software design and development in the field of cloud data security and cybersecurity; Design, development and implementation of software in the field of cloud data security and cybersecurity; Software as a service (SAAS) services, namely, providing an on-line non- downloadable software platform for risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security functions for use in the field of network security and cybersecurity; Platform as a service (PAAS) services featuring computer software platforms for risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security functions in the field of network security and internet security; Software as a service (SAAS) services, namely, providing an on-line non-downloadable software platform featuring cloud-based software for security threat analysis and remediation; Providing temporary use of non-downloadable software for the purpose of identifying, analyzing, tracking, monitoring and remediating security threats and vulnerabilities in computer software; Providing computer security threat management services, namely, monitoring and tracking of security vulnerabilities and problems in computer software; providing temporary use of non-downloadable cloud-based software for the purpose of identifying, analyzing, tracking, monitoring and remediating security threats and vulnerabilities in computer software and computer networks; Installation, repair and maintenance of computer software; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Technical support services, namely, troubleshooting in the nature of diagnosing problems related to risk management, governance, business intelligence, performance management, analytics, monitoring, and dashboarding capabilities for all security; Computer and internet security services, namely, software-as-a-service featuring software for identifying, measuring, anticipating, and mitigating cybersecurity risks through assessments that align with regulatory standards and compliance requirements, with user interfaces, dashboards, and reporting features in the nature of customized security reports detailing a user's potential cybersecurity gaps and areas of improvement; software security services, namely, providing security, protection and restoration services; Electronic data security services, namely, protecting data and information from unauthorized access and restoration of electronic data; Technology and computer consultation related to all of the above; Computer diagnostic services; Computer forensic services

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, May 11, 2023
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameXT Security Ltd.
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressHerzliya 6431512
IL

Trademark Events


Event DateEvent Description
Thursday, April 20, 2023NEW APPLICATION ENTERED
Thursday, May 11, 2023NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Thursday, January 11, 2024ASSIGNED TO EXAMINER
Wednesday, April 17, 2024TEAS RESPONSE TO OFFICE ACTION RECEIVED
Friday, January 19, 2024NON-FINAL ACTION WRITTEN
Friday, January 19, 2024NON-FINAL ACTION E-MAILED
Friday, January 19, 2024NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, April 17, 2024CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, April 17, 2024TEAS/EMAIL CORRESPONDENCE ENTERED
Friday, June 7, 2024FINAL REFUSAL WRITTEN
Friday, June 7, 2024NOTIFICATION OF FINAL REFUSAL EMAILED
Friday, June 7, 2024FINAL REFUSAL E-MAILED