Serial Number | 98768573 |
Word Mark | SYTECA |
Filing Date | Wednesday, September 25, 2024 |
Status | 630 - NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER |
Status Date | Wednesday, September 25, 2024 |
Registration Number | 0000000 |
Registration Date | NOT AVAILABLE |
Mark Drawing | 0 - NOT AVAILABLE |
Published for Opposition Date | NOT AVAILABLE |
Description of Mark | The mark consists of a shaded broken circle caused by two intersecting lines forming an arrow pointing to the right creating the appearance of a pie with a slice cut out, shown to the left of the term "Syteca". |
Goods and Services | Downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; Downloadable software for use in auditing of computer systems for cyber security threats; Downloadable software for regulatory compliance of computer systems and computer systems audits; Downloadable software used for simple and integrated video format reporting for live cyber incident response; Downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; Downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user activity; Downloadable software for managing user software licenses featuring affordable floating licensing subscriptions; Downloadable software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; Downloadable software for configuring manual approval during login, enforcing endpoint access restrictions, and ensuring that only authorized users can access critical systems; Downloadable software to manage and monitor privileged accounts and their access to systems and data within a network; Downloadable software for managing credentials, passwords, and privileged data, to ensure secure access to databases, operating systems, and web-based IT resources; Downloadable software for controlling remote access to privileged accounts with real-time monitoring and session recording, to ensure compliance and security; Downloadable software for implementing multi-factor authentication used to verify and manage privileged user identities; Downloadable software used for integrating with directory services for the centralized management of privileged accounts across on-premises and cloud environments; Downloadable software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; Downloadable software for real-time monitoring and threat detection of privileged account activities, with automated response capabilities for security incidents; Downloadable software for integration with third-party applications and cloud services, used to allow seamless integration with ticketing systems, SIEM tools, and other IT management systems; Downloadable software for enforcing identity policies across diverse IT environments and ensuring authorized access to sensitive data and systems; Downloadable software for securely storing and managing individual user credentials in a personal password vault |
Indication of Colors claimed | Color is not claimed as a feature of the mark. |
Goods and Services | Development and implementation of software solutions for universal and network protocol diagnostic monitoring; Monitoring of computer systems for detecting and analyzing user-based insider threats to data; Monitoring of third-party contractors and other business partners computer systems for cyber security threats to data; Development of customized software for others for use in regulatory compliance and in auditing of computer systems for cyber security threats; Providing temporary use of on-line non-downloadable software tools used for simple and integrated video format reporting for live cyber incident response; Providing temporary use of non-downloadable software for conducting a multi-factor search of computer systems cyber threats and generating corresponding reports; Development of customized software for others for user software license management featuring affordable floating licensing subscriptions; Providing temporary use of non-downloadable cloud-based software as tools for monitoring insider computer security; Software as a service (SaaS) services featuring software for monitoring user activity on computer systems and computer servers; Software as a service (SaaS) services featuring software for privileged access management used to manage and monitor privileged accounts and their access to systems and data within a network; Software as a service (SaaS) services featuring software used for managing credentials, passwords, and privileged data, and for ensuring secure access to databases, operating systems, and web-based IT resources; Software as a service (SaaS) services featuring software for controlling remote access to privileged accounts, equipped with real-time monitoring and session recording to ensure compliance and security; Software as a service (SaaS) services featuring software for implementing multi-factor authentication used to verify and manage privileged user identities, equipped with dynamic privilege adjustment based on risk; Software as a service (SaaS) services featuring software for integrating with directory services for centralized management of privileged accounts across on-premises and cloud environments and for providing unified audit trails and reporting; Software as a service (SaaS) services featuring software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; Software as a service (SaaS) services featuring software for real-time monitoring and threat detection of privileged account activities, equipped with automated response capabilities for security incidents; Software as a service (SaaS) services featuring software for enforcing identity policies across diverse IT environments, and for ensuring authorized access to sensitive data and systems; Software as a service (SaaS) services featuring software for securely storing and managing individual user credentials in a personal password vault, and for ensuring compliance with security policies; Software as a service (SaaS) services featuring software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; Software as a service (SaaS) services featuring software for configuring manual approval during login and for enforcing endpoint access restrictions to ensure that only authorized users can access critical systems; Software as a service (SaaS) services featuring software for session recording and for playback used to enable administrators to review user actions on endpoints for compliance audits and security investigations; Software as a service (SaaS) services featuring software for integration with third-party applications and cloud services to allow for seamless integration with ticketing systems, SIEM tools, and other IT management systems; Software as a service (SaaS) services featuring software used for endpoint activity monitoring, providing detailed reports on application usage, web browsing, and other user activities to support productivity and security analysis; Software as a service (SaaS) services featuring software for automating policy enforcement across user sessions and ensuring consistent application of security controls across all managed endpoints; Software as a service (SaaS) services featuring software for the centralized management of privileged user sessions, used for role-based access control and user session termination |
International Class | 009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus. |
US Class Codes | 021, 023, 026, 036, 038 |
Class Status Code | 6 - Active |
Class Status Date | Wednesday, September 25, 2024 |
Primary Code | 009 |
First Use Anywhere Date | NOT AVAILABLE |
First Use In Commerce Date | NOT AVAILABLE |
International Class | 042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software. |
US Class Codes | 100, 101 |
Class Status Code | 6 - Active |
Class Status Date | Wednesday, September 25, 2024 |
Primary Code | 042 |
First Use Anywhere Date | NOT AVAILABLE |
First Use In Commerce Date | NOT AVAILABLE |
Party Name | Syteca, Inc. |
Party Type | 10 - Original Applicant |
Legal Entity Type | 03 - Corporation |
Address | Needham, MA 02494 |
Event Date | Event Description |
Wednesday, September 25, 2024 | NEW APPLICATION ENTERED |