Trademark Overview
On Friday, December 9, 2022, a trademark application was filed for ILLUSIVE SPOTLIGHT with the United States Patent and Trademark Office. The USPTO has given the ILLUSIVE SPOTLIGHT trademark a serial number of 97711543. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Wednesday, February 28, 2024. This trademark is owned by Illusive Networks Ltd.. The ILLUSIVE SPOTLIGHT trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:
Hardware and software for computer network security; hardware and software for cloud-based computer security; hardware and software for monitoring computer networks; hardware and software for detecting computer network intrusion
Computer network security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; computer network security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer network intrusion detection services; monitoring of computer systems for security purposes
Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; cloud-based computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; technical support, namely, monitoring technological functions of computer network systems; computer security consultancy; Computer network security consultation services; computer security services, namely, restricting unauthorized network access by users without credentials; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; network monitoring services; services for planting network deceptions; services for pro-active network attack prevention