ZTRUST Trademark

Trademark Overview


On Monday, November 25, 2024, a trademark application was filed for ZTRUST with the United States Patent and Trademark Office. The USPTO has given the ZTRUST trademark a serial number of 98872542. The federal status of this trademark filing is PUBLISHED FOR OPPOSITION as of Tuesday, September 9, 2025. This trademark is owned by Vertali Ltd. The ZTRUST trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Software as a service (SAAS) services featuring software for detecting, monitoring and optionally enforcing network access; Software as a service (SAAS) services featuring software for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Software as a service (SAAS) services featuring software for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Software as a service (SAAS) services featuring software for identifying network segments that are accessing specific applications without encryption and/or with encryption; Software as a service (SAAS) services featuring software for managing network segmentation; Software as a service (SAAS) services featuring software for building a network knowledge base; Software as a service (SAAS) services featuring software for automatically generating enterprise service management resource definitions and access lists; Soft...
ztrust

General Information


Serial Number98872542
Word MarkZTRUST
Filing DateMonday, November 25, 2024
Status686 - PUBLISHED FOR OPPOSITION
Status DateTuesday, September 9, 2025
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, September 9, 2025

Trademark Statements


Pseudo MarkZ TRUST; ZERO TRUST
Goods and ServicesSoftware as a service (SAAS) services featuring software for detecting, monitoring and optionally enforcing network access; Software as a service (SAAS) services featuring software for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Software as a service (SAAS) services featuring software for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Software as a service (SAAS) services featuring software for identifying network segments that are accessing specific applications without encryption and/or with encryption; Software as a service (SAAS) services featuring software for managing network segmentation; Software as a service (SAAS) services featuring software for building a network knowledge base; Software as a service (SAAS) services featuring software for automatically generating enterprise service management resource definitions and access lists; Software as a service (SAAS) services featuring software for building policy agent profiles from the enterprise service management resources; Software as a service (SAAS) services featuring software for monitoring network activity and alert on policy violations; Software as a service (SAAS) services featuring software for providing proof positive data, including periodic reports; Software as a service (SAAS) services featuring software for detecting network traffic; Software as a service (SAAS) services featuring software for accessing lists based on current network traffic; Software as a service (SAAS) services featuring software for building profiles required to block or permit specific network traffic based on access controls; Software as a service (SAAS) services featuring software for providing standard commands; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for detecting, monitoring and optionally enforcing network access; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying applications that are permanently or temporarily accepting inbound non-encrypted and/or inbound encrypted connections; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying applications that are making outbound nonencrypted and/or outbound encrypted connections; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for identifying network segments that are accessing specific applications without encryption and/or with encryption; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for managing network segmentation; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building a network knowledge base; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for automatically generating enterprise service management resource definitions and access lists; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building policy agent profiles from the enterprise service management resources; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for monitoring network activity and alert on policy violations; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for providing proof positive data, including periodic reports; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for detecting network traffic; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for accessing lists based on current network traffic; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for building profiles required to block or permit specific network traffic based on access controls; Providing on-line non-downloadable computer software over computer networks, intranets, and the internet for providing standard commands

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateMonday, November 25, 2024
Primary Code042
First Use Anywhere DateSunday, November 5, 2023
First Use In Commerce DateSunday, November 5, 2023

Trademark Owner History


Party NameVertali Ltd
Party Type20 - Owner at Publication
Legal Entity Type24 - NOT AVAILABLE
AddressWorcestershire B603DJ

Party NameVertali Ltd
Party Type10 - Original Applicant
Legal Entity Type24 - NOT AVAILABLE
AddressWorcestershire B603DJ

Trademark Events


Event DateEvent Description
Saturday, April 26, 2025NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Tuesday, November 26, 2024NEW APPLICATION ENTERED
Monday, May 19, 2025ASSIGNED TO EXAMINER
Sunday, July 13, 2025NOTIFICATION OF NON-FINAL ACTION E-MAILED
Sunday, August 3, 2025CORRESPONDENCE RECEIVED IN LAW OFFICE
Sunday, August 3, 2025TEAS RESPONSE TO OFFICE ACTION RECEIVED
Sunday, August 3, 2025TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, August 6, 2025APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, September 3, 2025NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Tuesday, September 9, 2025PUBLISHED FOR OPPOSITION
Tuesday, September 9, 2025OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Sunday, July 13, 2025NON-FINAL ACTION E-MAILED
Sunday, July 13, 2025NON-FINAL ACTION WRITTEN