TRELLIX Trademark

Trademark Overview


On Tuesday, January 18, 2022, a trademark application was filed for TRELLIX with the United States Patent and Trademark Office. The USPTO has given the TRELLIX trademark a serial number of 97225536. The federal status of this trademark filing is REGISTERED as of Tuesday, July 9, 2024. This trademark is owned by MUSARUBRA US LLC. The TRELLIX trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Downloadable and recorded computer utility software for configuring and maintaining functionality of computer systems; downloadable computer anti-virus software; downloadable and recorded computer software and computer hardware for providing enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computer security; downloadable and recorded computer software and computer hardware for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; downloadable and recorded computer software for the detection, blocking and removal of computer viruses, malware and other threats; downloadable and recorded computer communications software for monitoring, managing, filtering, and regulating electronic and wireless communications; downloadable and recorded computer software for protecting and securing computer networks and applications; ...

Providing temporary use of non-downloadable security software for protecting computer networks from unauthorized breach; providing temporary use of non-downloadable software for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; providing temporary use of non-downloadable software for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; providing temporary use of nondownloadable software for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use in conjunction with computer software and hardware; technology consultation in the field of cybersecurity; providing temporary use of non-downloadable software...
trellix

General Information


Serial Number97225536
Word MarkTRELLIX
Filing DateTuesday, January 18, 2022
Status700 - REGISTERED
Status DateTuesday, July 9, 2024
Registration Number7444085
Registration DateTuesday, July 9, 2024
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, January 23, 2024

Trademark Statements


Goods and ServicesDownloadable and recorded computer utility software for configuring and maintaining functionality of computer systems; downloadable computer anti-virus software; downloadable and recorded computer software and computer hardware for providing enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computer security; downloadable and recorded computer software and computer hardware for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; downloadable and recorded computer software for the detection, blocking and removal of computer viruses, malware and other threats; downloadable and recorded computer communications software for monitoring, managing, filtering, and regulating electronic and wireless communications; downloadable and recorded computer software for protecting and securing computer networks and applications; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for detecting and repairing computer software and hardware; downloadable and recorded computer software and computer hardware for automatically confirming and enforcing computer security policies, for identifying computer security policy violations, and for generating computer security policy compliance reports; downloadable and recorded computer software and computer hardware for the management, administration and optimization of computer networks and applications; downloadable and recorded computer software and computer hardware for use in the monitoring and control of, and generating reports on, computer and online activity; downloadable and recorded computer software for creating and maintaining firewalls; computer hardware and downloadable and recorded computer software for protecting and securing computer systems and computer networks and applications; downloadable software for detecting and preventing intrusions on computer networks and for repairing computer networks; downloadable and recorded computer software and computer hardware for encrypting and authenticating data; downloadable and recorded computer software for protecting the identity protection, authentication of users, authenticating users, and controlling privacy control settings; downloadable and recorded computer software for providing secure storage and management of usernames and passwords; downloadable software for filtering content; computer hardware and downloadable and recorded computer software for automatically updating computer utility and security software; computer hardware and downloadable and recorded computer software for rating the security level of internet sites; downloadable and recorded computer software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology
Goods and ServicesProviding temporary use of non-downloadable security software for protecting computer networks from unauthorized breach; providing temporary use of non-downloadable software for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; providing temporary use of non-downloadable software for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; providing temporary use of nondownloadable software for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use in conjunction with computer software and hardware; technology consultation in the field of cybersecurity; providing temporary use of non-downloadable software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; security as a service (SECaas) featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; security as a service (SECaas) featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; security as a service (SECaas) featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; security as a service (SECaas) featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; software as a service (SAAS) services featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; software as a service (SAAS) services featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; software as a service (SAAS) services featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; software as a service (SAAS) services featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; platform as a service (PAAS) featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; platform as a service (PAAS) featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; platform as a service (PAAS) featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; platform as a service (PAAS) featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; infrastructure as a service (IAAS) services, namely, hosting software for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others and all related to extended detection and response technology; computer security consulting, computer performance testing services, computer software research services and computer software advisory services all related to computer, data, and network security; technological research in the field of computer hardware; research of computer software; development and design of computer hardware and software; technical support services for others in the fields of computer, data, and network security, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; automatic updating of computer software; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; computer security threat analysis for protecting data in the nature of collecting, compiling, and analyzing data for the purpose of generating and transmitting reports on and ratings of the level of security of third party software residing on the computers of others; computer programming services for others in the fields of computer, data, and network security; computer forensics services; providing computer security information in the fields of network, data, and computer security; maintenance of computer software; monitoring of computer systems for security purposes to protect data and information from unauthorized access, namely, monitoring of computer systems for detecting unauthorized access or data breach; computer security services, namely, intrusion detection services in the nature of monitoring of computer systems for detecting unauthorized access or data breach, intrusion prevention services in the nature of restricting unauthorized access to computer networks and endpoints, vulnerability assessment services, and in the nature of computer security consultancy related to scanning and penetration testing of computer networks to assess information security vulnerability, and computer services in the nature of online detecting and removing of computer viruses and threats on computers; cybersecurity services in the nature of restricting unauthorized access to computer systems

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateMonday, January 24, 2022
Primary Code009
First Use Anywhere DateFriday, December 31, 2021
First Use In Commerce DateFriday, December 31, 2021

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateMonday, January 24, 2022
Primary Code042
First Use Anywhere DateFriday, December 31, 2021
First Use In Commerce DateFriday, December 31, 2021

Trademark Owner History


Party NameMUSARUBRA US LLC
Party Type30 - Original Registrant
Legal Entity Type16 - Limited Liability Company
AddressPLANO, TX 75024

Party NameMUSARUBRA US LLC
Party Type20 - Owner at Publication
Legal Entity Type16 - Limited Liability Company
AddressPLANO, TX 75024

Party NameMUSARUBRA US LLC
Party Type10 - Original Applicant
Legal Entity Type16 - Limited Liability Company
AddressPLANO, TX 75024

Trademark Events


Event DateEvent Description
Friday, January 21, 2022NEW APPLICATION ENTERED
Monday, January 24, 2022NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Wednesday, October 26, 2022ASSIGNED TO EXAMINER
Wednesday, November 2, 2022NON-FINAL ACTION WRITTEN
Wednesday, November 2, 2022NON-FINAL ACTION E-MAILED
Wednesday, November 2, 2022NOTIFICATION OF NON-FINAL ACTION E-MAILED
Monday, May 1, 2023TEAS RESPONSE TO OFFICE ACTION RECEIVED
Monday, May 1, 2023CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, May 2, 2023TEAS/EMAIL CORRESPONDENCE ENTERED
Tuesday, May 30, 2023NON-FINAL ACTION WRITTEN
Tuesday, May 30, 2023NON-FINAL ACTION E-MAILED
Tuesday, May 30, 2023NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, August 23, 2023APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED
Wednesday, August 23, 2023APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED
Wednesday, November 22, 2023TEAS RESPONSE TO OFFICE ACTION RECEIVED
Wednesday, November 22, 2023CORRESPONDENCE RECEIVED IN LAW OFFICE
Thursday, November 23, 2023TEAS/EMAIL CORRESPONDENCE ENTERED
Thursday, December 21, 2023APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, January 3, 2024NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Tuesday, January 23, 2024PUBLISHED FOR OPPOSITION
Tuesday, January 23, 2024OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, March 19, 2024NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Wednesday, May 1, 2024USE AMENDMENT FILED
Wednesday, May 1, 2024TEAS STATEMENT OF USE RECEIVED
Wednesday, May 29, 2024CASE ASSIGNED TO INTENT TO USE PARALEGAL
Wednesday, May 29, 2024STATEMENT OF USE PROCESSING COMPLETE
Saturday, June 1, 2024NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
Saturday, June 1, 2024ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
Tuesday, July 9, 2024REGISTERED-PRINCIPAL REGISTER
Tuesday, July 9, 2024NOTICE OF REGISTRATION CONFIRMATION EMAILED
Thursday, August 29, 2024ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY