Trademark Overview
On Monday, April 5, 2021, a trademark application was filed for SECURITY OF THINGS with the United States Patent and Trademark Office. The USPTO has given the SECURITY OF THINGS trademark a serial number of 90623826. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Monday, June 13, 2022. This trademark is owned by Phosphorus Cybersecurity Inc.. The SECURITY OF THINGS trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:
Downloadable software featuring cybersecurity software; downloadable software, namely, software for assessing organization risk within a business relating to cybersecurity threats; downloadable software, namely, software for detecting, assessing, and remediating vulnerabilities' to prevent Internet of Things (IoT) devices from launch network attacks and cybersecurity threats; downloadable software, namely, software for use in detecting expired firmware and software, and managing password and access credentials; cybersecurity services, namely, developing, implementing, and monitoring information technology and computer security protocols to mitigate organizational risk and to prevent unauthorized access to business networks and information technology infrastructure
Software as a Service (SaaS) services featuring cybersecurity software; Software as a Service (SaaS) services, namely, software for assessing organization risk within a business relating to cybersecurity threats; Software as a Service (SaaS) services, namely, software for detecting, assessing, and remediating vulnerabilities' to prevent Internet of Things (IoT) devices from launch network attacks and cybersecurity threats; Software as a Service (SaaS) services, namely, software for use in detecting expired firmware and software, and managing password and access credentials; cybersecurity services, namely, developing, implementing, and monitoring information technology and computer security protocols to mitigate organizational risk and to prevent unauthorized access to business networks and information technology infrastructure