SYTECA Trademark

Trademark Overview


On Wednesday, September 25, 2024, a trademark application was filed for SYTECA with the United States Patent and Trademark Office. The USPTO has given the SYTECA trademark a serial number of 98768572. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Wednesday, September 25, 2024. This trademark is owned by Syteca, Inc.. The SYTECA trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; Downloadable software for use in auditing of computer systems for cyber security threats; Downloadable software for regulatory compliance of computer systems and computer systems audits; Downloadable software used for simple and integrated video format reporting for live cyber incident response; Downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; Downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user a...

Development and implementation of software solutions for universal and network protocol diagnostic monitoring; Monitoring of computer systems for detecting and analyzing user-based insider threats to data; Monitoring of third-party contractors and other business partners computer systems for cyber security threats to data; Development of customized software for others for use in regulatory compliance and in auditing of computer systems for cyber security threats; Providing temporary use of on-line non-downloadable software tools used for simple and integrated video format reporting for live cyber incident response; Providing temporary use of non-downloadable software for conducting a multi-factor search of computer systems cyber threats and generating corresponding reports; Development of customized software for others for user software license management featuring affordable floating licensing subscriptions; Providing temporary use of non-downloadable cloud-based software as tools for...
syteca

General Information


Serial Number98768572
Word MarkSYTECA
Filing DateWednesday, September 25, 2024
Status630 - NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
Status DateWednesday, September 25, 2024
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesDownloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; Downloadable software for use in auditing of computer systems for cyber security threats; Downloadable software for regulatory compliance of computer systems and computer systems audits; Downloadable software used for simple and integrated video format reporting for live cyber incident response; Downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; Downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user activity; Downloadable software for managing user software licenses featuring affordable floating licensing subscriptions; Downloadable software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; Downloadable software for configuring manual approval during login, enforcing endpoint access restrictions, and ensuring that only authorized users can access critical systems; Downloadable software to manage and monitor privileged accounts and their access to systems and data within a network; Downloadable software for managing credentials, passwords, and privileged data, to ensure secure access to databases, operating systems, and web-based IT resources; Downloadable software for controlling remote access to privileged accounts with real-time monitoring and session recording, to ensure compliance and security; Downloadable software for implementing multi-factor authentication used to verify and manage privileged user identities; Downloadable software used for integrating with directory services for the centralized management of privileged accounts across on-premises and cloud environments; Downloadable software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; Downloadable software for real-time monitoring and threat detection of privileged account activities, with automated response capabilities for security incidents; Downloadable software for integration with third-party applications and cloud services, used to allow seamless integration with ticketing systems, SIEM tools, and other IT management systems; Downloadable software for enforcing identity policies across diverse IT environments and ensuring authorized access to sensitive data and systems; Downloadable software for securely storing and managing individual user credentials in a personal password vault
Goods and ServicesDevelopment and implementation of software solutions for universal and network protocol diagnostic monitoring; Monitoring of computer systems for detecting and analyzing user-based insider threats to data; Monitoring of third-party contractors and other business partners computer systems for cyber security threats to data; Development of customized software for others for use in regulatory compliance and in auditing of computer systems for cyber security threats; Providing temporary use of on-line non-downloadable software tools used for simple and integrated video format reporting for live cyber incident response; Providing temporary use of non-downloadable software for conducting a multi-factor search of computer systems cyber threats and generating corresponding reports; Development of customized software for others for user software license management featuring affordable floating licensing subscriptions; Providing temporary use of non-downloadable cloud-based software as tools for monitoring insider computer security; Software as a service (SaaS) services featuring software for monitoring user activity on computer systems and computer servers; Software as a service (SaaS) services featuring software for privileged access management used to manage and monitor privileged accounts and their access to systems and data within a network; Software as a service (SaaS) services featuring software used for managing credentials, passwords, and privileged data, and for ensuring secure access to databases, operating systems, and web-based IT resources; Software as a service (SaaS) services featuring software for controlling remote access to privileged accounts, equipped with real-time monitoring and session recording to ensure compliance and security; Software as a service (SaaS) services featuring software for implementing multi-factor authentication used to verify and manage privileged user identities, equipped with dynamic privilege adjustment based on risk; Software as a service (SaaS) services featuring software for integrating with directory services for centralized management of privileged accounts across on-premises and cloud environments and for providing unified audit trails and reporting; Software as a service (SaaS) services featuring software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; Software as a service (SaaS) services featuring software for real-time monitoring and threat detection of privileged account activities, equipped with automated response capabilities for security incidents; Software as a service (SaaS) services featuring software for enforcing identity policies across diverse IT environments, and for ensuring authorized access to sensitive data and systems; Software as a service (SaaS) services featuring software for securely storing and managing individual user credentials in a personal password vault, and for ensuring compliance with security policies; Software as a service (SaaS) services featuring software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; Software as a service (SaaS) services featuring software for configuring manual approval during login and for enforcing endpoint access restrictions to ensure that only authorized users can access critical systems; Software as a service (SaaS) services featuring software for session recording and for playback used to enable administrators to review user actions on endpoints for compliance audits and security investigations; Software as a service (SaaS) services featuring software for integration with third-party applications and cloud services to allow for seamless integration with ticketing systems, SIEM tools, and other IT management systems; Software as a service (SaaS) services featuring software used for endpoint activity monitoring, providing detailed reports on application usage, web browsing, and other user activities to support productivity and security analysis; Software as a service (SaaS) services featuring software for automating policy enforcement across user sessions and ensuring consistent application of security controls across all managed endpoints; Software as a service (SaaS) services featuring software for the centralized management of privileged user sessions, used for role-based access control and user session termination

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateWednesday, September 25, 2024
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateWednesday, September 25, 2024
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameSyteca, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressNeedham, MA 02494

Trademark Events


Event DateEvent Description
Wednesday, September 25, 2024NEW APPLICATION ENTERED