OT Trademark

Trademark Overview


On Tuesday, December 18, 2018, a trademark application was filed for OT with the United States Patent and Trademark Office. The USPTO has given the OT trademark a serial number of 88234301. The federal status of this trademark filing is REGISTERED as of Tuesday, December 24, 2019. This trademark is owned by Claroty Ltd.. The OT trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Downloadable computer software for use in protecting the safety of people, assets, and critical processes from cyberattacks by discovering and eliminating vulnerabilities, misconfigurations and insecure connections and monitoring and detecting malicious activity on networks; Downloadable computer software for use in accessing, viewing and monitoring industrial control system networks; downloadable computer software for use in real-time monitoring of computer networks; downloadable computer software for use in managing and controlling employee and 3rd party remote access to computer systems; downloadable computer software for use in protecting computer systems through integration with existing system infrastructure; downloadable computer software for use in enterprise computer system management; computer hardware; computer and Internet servers; image and optical sensors; computer hardware and downloadable software for use in enterprise computer system and network management and cybersec...

Software as a Service (SAAS) featuring software for use in protecting the safety of people, assets, and critical processes from cyberattacks by discovering and eliminating vulnerabilities, misconfigurations and insecure connections and monitoring and detecting malicious activity on networks; Software as a Service (SAAS) featuring software for use in accessing, viewing and monitoring industrial control system networks; Software as a Service (SAAS) featuring software for use in real-time monitoring of computer networks; Software as a Service (SAAS) featuring software for use in managing and controlling employee and 3rd party remote access to computer systems; Software as a Service (SAAS) featuring software for use in protecting computer systems through integration with existing system infrastructure; Software as a Service (SAAS) featuring software for use in enterprise computer system management; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring ...
ot

General Information


Serial Number88234301
Word MarkOT
Filing DateTuesday, December 18, 2018
Status700 - REGISTERED
Status DateTuesday, December 24, 2019
Registration Number5941751
Registration DateTuesday, December 24, 2019
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateTuesday, October 8, 2019

Trademark Statements


Description of MarkThe mark consists of the stylized design of the letters "OT".
Goods and ServicesDownloadable computer software for use in protecting the safety of people, assets, and critical processes from cyberattacks by discovering and eliminating vulnerabilities, misconfigurations and insecure connections and monitoring and detecting malicious activity on networks; Downloadable computer software for use in accessing, viewing and monitoring industrial control system networks; downloadable computer software for use in real-time monitoring of computer networks; downloadable computer software for use in managing and controlling employee and 3rd party remote access to computer systems; downloadable computer software for use in protecting computer systems through integration with existing system infrastructure; downloadable computer software for use in enterprise computer system management; computer hardware; computer and Internet servers; image and optical sensors; computer hardware and downloadable software for use in enterprise computer system and network management and cybersecurity threat detection and management; downloadable computer software and computer hardware systems for monitoring, measuring, tracking and reporting computer network behavioral patterns to discover risks, correlate security information, assess vulnerabilities, and managing and communicating compliance, all in the area of enterprise security and industrial control systems; downloadable computer software for managing and filtering electronic communications; downloadable computer software for encrypting and authenticating data; downloadable computer software for detecting and repairing computer software, computer hardware, and computer network problems; downloadable computer software for verifying compliance with security policies
Indication of Colors claimedColor is not claimed as a feature of the mark.
Disclaimer with Predetermined Text"OT"
Goods and ServicesSoftware as a Service (SAAS) featuring software for use in protecting the safety of people, assets, and critical processes from cyberattacks by discovering and eliminating vulnerabilities, misconfigurations and insecure connections and monitoring and detecting malicious activity on networks; Software as a Service (SAAS) featuring software for use in accessing, viewing and monitoring industrial control system networks; Software as a Service (SAAS) featuring software for use in real-time monitoring of computer networks; Software as a Service (SAAS) featuring software for use in managing and controlling employee and 3rd party remote access to computer systems; Software as a Service (SAAS) featuring software for use in protecting computer systems through integration with existing system infrastructure; Software as a Service (SAAS) featuring software for use in enterprise computer system management; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems by remote access to ensure proper functioning; Computer security consultancy; Computer security threat analysis for protecting data; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of computer software and computer software systems; design and development of computer software and computer software systems for monitoring computer network behavioral patterns to discover risks in the area of enterprise security and industrial control systems; design and development of computer software and computer software systems for monitoring computer network behavioral patterns to correlate security information in the area of enterprise security and industrial control systems; design and development of computer software and computer software systems for monitoring computer network behavioral patterns to assess vulnerabilities, and managing and communicating compliance in the area of enterprise security and industrial control systems; computer programming; consultancy, design, testing, research and advisory services, all relating to computer programming; consultancy, design, testing, research and advisory services, all relating to computer security and computer networks; technical and strategic consultation in the field of computer software, network management and network security; technical support services relating to computer software, namely, troubleshooting of computer software problems and troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services relating to computer security, namely, computer security consultancy services, computer security services in the nature of administering digital keys and certificates, and maintenance and updating of computer software to prevent computer security risks; technical support services relating to computer networks and the Internet, namely, troubleshooting of computer software problems and troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software for others; technical support services, namely, troubleshooting of computer network problems for others; services for enhancing the performance, function and security of computer networks, namely, computer network design and configuration for others; data security services, namely, electronic data security services, namely, design and development of electronic data security systems in connection with mobile applications; provision of security services for computer networks, namely, monitoring access to and by computer networks to and of undesired websites, media and individuals and facilities; Computer security service, namely, hard drive erasure; providing on-line non-downloadable software for use in monitoring of computer systems for security purposes; technical support and consulting services in the fields of computer security, vulnerability of computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring online, non-downloadable software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of on-line non-downloadable software for use in providing tools used for cyber-security

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, January 10, 2019
Primary Code009
First Use Anywhere DateTuesday, September 13, 2016
First Use In Commerce DateTuesday, September 13, 2016

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, January 10, 2019
Primary Code042
First Use Anywhere DateTuesday, September 13, 2016
First Use In Commerce DateTuesday, September 13, 2016

Trademark Owner History


Party NameClaroty Ltd.
Party Type30 - Original Registrant
Legal Entity Type99 - Other
AddressTel Aviv
IL

Party NameClaroty Ltd.
Party Type20 - Owner at Publication
Legal Entity Type99 - Other
AddressTel Aviv
IL

Party NameClaroty Ltd.
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressTel Aviv
IL

Trademark Events


Event DateEvent Description
Monday, June 27, 2022APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED
Monday, June 27, 2022TEAS CHANGE OF CORRESPONDENCE RECEIVED
Monday, June 27, 2022ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Monday, June 27, 2022TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Monday, June 27, 2022TEAS CHANGE OF OWNER ADDRESS RECEIVED
Tuesday, December 24, 2019REGISTERED-PRINCIPAL REGISTER
Tuesday, October 8, 2019OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, October 8, 2019PUBLISHED FOR OPPOSITION
Wednesday, September 18, 2019NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Thursday, September 5, 2019APPROVED FOR PUB - PRINCIPAL REGISTER
Thursday, August 8, 2019TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, August 7, 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, August 7, 2019TEAS RESPONSE TO OFFICE ACTION RECEIVED
Friday, July 5, 2019NOTIFICATION OF NON-FINAL ACTION E-MAILED
Friday, July 5, 2019NON-FINAL ACTION E-MAILED
Friday, July 5, 2019NON-FINAL ACTION WRITTEN
Wednesday, June 5, 2019TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, June 5, 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, May 28, 2019ASSIGNED TO LIE
Thursday, May 23, 2019TEAS RESPONSE TO OFFICE ACTION RECEIVED
Thursday, March 21, 2019NOTIFICATION OF NON-FINAL ACTION E-MAILED
Thursday, March 21, 2019NON-FINAL ACTION E-MAILED
Thursday, March 21, 2019NON-FINAL ACTION WRITTEN
Wednesday, March 13, 2019ASSIGNED TO EXAMINER
Friday, January 11, 2019NOTICE OF DESIGN SEARCH CODE E-MAILED
Thursday, January 10, 2019NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Friday, December 21, 2018NEW APPLICATION ENTERED