Trademark Overview
On Monday, October 7, 2024, a trademark application was filed for WHERE ZERO TRUST BEGINS with the United States Patent and Trademark Office. The USPTO has given the WHERE ZERO TRUST BEGINS trademark a serial number of 98788028. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Monday, October 7, 2024. This trademark is owned by INVISINET TECHNOLOGIES, LLC. The WHERE ZERO TRUST BEGINS trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:
Recorded software for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats; downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats; Recorded computer application software for network gateways, computer network switches, routers, laptops, desktop computers, computer network servers, mobile devices, and Internet of Things (IoT) enabled devices, nam...
Platform as a service (PAAS) featuring computer software platforms for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats; Software-as-a-Service (SAAS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes, namely, software for cyber security and risk vulnerability management, for restricting unauthorized access to computer systems, for detecting and assessing cybersecurity threats, for use in the detection, analysis, mitigation and resolution of cybersecurity threats