MARO Trademark

Trademark Overview


On Tuesday, October 1, 2024, a trademark application was filed for MARO with the United States Patent and Trademark Office. The USPTO has given the MARO trademark a serial number of 98781287. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Wednesday, October 2, 2024. This trademark is owned by Cyberlume, Inc.. The MARO trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Downloadable anti-piracy software; Downloadable anti-spyware software; Downloadable computer software for computer network and computer system security, enterprise system management, network management, and monitoring; Downloadable computer software for protecting businesses and customer data from malware and hackers; Downloadable computer software for internet security, security vulnerability assessment, security awareness training, compliance monitoring, compliance tracking, and managed security solutions; Downloadable computer software for use in the field of cybersecurity for assisting in IT risk management, network analysis, and threat identification and protection; Downloadable computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application, and security event data from computers and computer networks; Downloadable computer software for use in transmitting and receiving system, application, and security event data from com...

Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer virus protection services; Monitoring of computer systems for detecting unauthorized access or data breach; Services for maintenance of computer software; Consultation services relating to computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for computer network and computer system security, enterprise system management, network management, and monitoring; Software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and hackers; Software as a service (SAAS) services featuring software for internet security, s...
maro

General Information


Serial Number98781287
Word MarkMARO
Filing DateTuesday, October 1, 2024
Status630 - NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
Status DateWednesday, October 2, 2024
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesDownloadable anti-piracy software; Downloadable anti-spyware software; Downloadable computer software for computer network and computer system security, enterprise system management, network management, and monitoring; Downloadable computer software for protecting businesses and customer data from malware and hackers; Downloadable computer software for internet security, security vulnerability assessment, security awareness training, compliance monitoring, compliance tracking, and managed security solutions; Downloadable computer software for use in the field of cybersecurity for assisting in IT risk management, network analysis, and threat identification and protection; Downloadable computer software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application, and security event data from computers and computer networks; Downloadable computer software for use in transmitting and receiving system, application, and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, and network attacks and breaches; Downloadable computer software for monitoring, analyzing, and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; Downloadable computer software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks, and hosted security software; Downloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission; Downloadable computer software for scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Downloadable computer software for use by others for detecting, blocking, and removing computer viruses and threats; Downloadable computer software for identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Downloadable computer software for managing security and access control to computer networks and network devices; Downloadable computer software for imaging, updating, and maintaining security and access control to computers; Downloadable computer software for remotely and securely managing computers, other electronic devices, and the content on those computers and devices; Downloadable computer software for surveillance, security, cybersecurity, cybersecurity control, cybersecurity warning, data security, managing business processes, authentication services, and enhancement of business productivity; Downloadable computer software for monitoring and controlling communication between computers and automated machine systems; Downloadable computer software for ollecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; Downloadable computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; Downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; Downloadable computer software for use in analyzing and monitoring computer networks and network access; Downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; Downloadable computer software for the creation of firewalls; Downloadable computer anti-virus software
Translation of Words in MarkThe wording "MARO" has no meaning in a foreign language.
Goods and ServicesComputer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer virus protection services; Monitoring of computer systems for detecting unauthorized access or data breach; Services for maintenance of computer software; Consultation services relating to computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for computer network and computer system security, enterprise system management, network management, and monitoring; Software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and hackers; Software as a service (SAAS) services featuring software for internet security, security vulnerability assessment, security awareness training, compliance monitoring, compliance tracking, and managed security solutions; Software as a service (SAAS) services featuring software for use in the field of cybersecurity for assisting in IT risk management, network analysis, and threat identification and protection; Software as a service (SAAS) services featuring software for use in collecting, filtering, normalizing, enriching, processing, and analyzing system, application, and security event data from computers and computer networks; Software as a service (SAAS) services featuring software for use in transmitting and receiving system, application, and security event data from computers and computer networks for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, and network attacks and breaches; Software as a service (SAAS) services featuring software for monitoring, analyzing, and reporting on event data from computers and computer networks for analysis and action by security administrators or security software; Software as a service (SAAS) services featuring software for use in providing a secure connection for security log and event data between computers, mobile devices, computer networks, and hosted security software; Software as a service (SAAS) services featuring software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming event transmission; Software as a service (SAAS) services featuring software for scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Software as a service (SAAS) services featuring software for use by others for detecting, blocking, and removing computer viruses and threats; Software as a service (SAAS) services featuring software for identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Software as a service (SAAS) services featuring software for managing security and access control to computer networks and network devices; Software as a service (SAAS) services featuring software for imaging, updating, and maintaining security and access control to computers; Software as a service (SAAS) services featuring software for remotely and securely managing computers, other electronic devices, and the content on those computers and devices; Software as a service (SAAS) services featuring software for surveillance, security, cybersecurity, cybersecurity control, cybersecurity warning, data security, managing business processes, authentication services, and enhancement of business productivity; Software as a service (SAAS) services featuring software for monitoring and controlling communication between computers and automated machine systems; Software as a service (SAAS) services featuring software for ollecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; Software as a service (SAAS) services featuring software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; Software as a service (SAAS) services featuring software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; Software as a service (SAAS) services featuring software for use in analyzing and monitoring computer networks and network access; Software as a service (SAAS) services featuring software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; Software as a service (SAAS) services featuring software for the creation of firewalls; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateTuesday, October 1, 2024
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, October 1, 2024
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameCyberlume, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressMiami, FL 33179

Trademark Events


Event DateEvent Description
Wednesday, October 2, 2024NEW APPLICATION ENTERED