Trademark Overview
On Friday, October 17, 2025, a trademark application was filed for ICAM INTEGRATOR with the United States Patent and Trademark Office. The USPTO has given the ICAM INTEGRATOR trademark a serial number of 99448525. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Friday, October 17, 2025. This trademark is owned by GSS Cyber Solutions, Inc.. The ICAM INTEGRATOR trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:
Business consulting services in the field of cybersecurity, identity management, and system integration; Business assistance, advisory and consulting services in the field of cybersecurity, identity management, and system integration
Downloadable software for identity and access management, user authentication, access control, and cybersecurity risk management; Downloadable software for coordinating, combining, and unifying technology based on application specific characteristics and identity; Downloadable cloud-based software for identity and access management, user authentication, access control, and cybersecurity risk management; Downloadable cloud-based software for coordinating, combining, and unifying technology based on application specific characteristics and identity
Providing temporary use of on-line non-downloadable software for identity and access management, user authentication, access control, and cybersecurity risk management; Providing temporary use of on-line non-downloadable software for coordinating, combining, and unifying technology based on application specific characteristics and identity; Providing temporary use of non-downloadable cloud-based software for identity and access management, user authentication, access control, and cybersecurity risk management; Providing temporary use of non-downloadable cloud-based software for coordinating, combining, and unifying technology based on application specific characteristics and identity; Software as a service (SAAS) services featuring software for identity and access management, user authentication, access control, and cybersecurity risk management; Software as a service (SAAS) services featuring software for coordinating, combining, and unifying technology based on application specific c...
Training services in the field of cybersecurity, identity management, and secure access technologies; Virtual training services in the field of cybersecurity, identity management, and secure access technologies; Consulting services in the field of cybersecurity, identity management, and secure access technologies training