Serial Number
98531858
Owner
TRAPP TECHNOLOGY, INC.Attorney
Gary W. NewsonFirst Use Date
Oct 4, 2022
Filing Date
May 2, 2024
A Trademark
Serial Number: 98531858 • Registration: 7783242
Trademark Classes
Class 9 - Computers & Electronics
Scientific, nautical, surveying, photographic, cinematographic, optical apparatus and instruments
Class 41 - Education & Entertainment
Education; providing of training; entertainment; sporting and cultural activities
Class 42 - Computer & Scientific
Scientific and technological services; industrial analysis and research services
Owner Contact Info
Legal Representation
Correspondence Address
Gary W. Newson NOBLITT & NEWSON, PLLC
8501 North Scottsdale Rd., Ste. 255
SCOTTSDALE, AZ 85253
United States
Trademark Details
Filing Date
May 2, 2024
Registration Date
May 6, 2025
First Use Anywhere
October 4, 2022
First Use in Commerce
October 4, 2022
Published for Opposition
March 18, 2025
Goods & Services
Educational services, namely, arranging, organizing, conducting, and presenting educational classes, non-downloadable webinars, and online instruction, all in the field of computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis
Downloadable computer network and security threat management software; computer and network security threat management hardware in the nature of computer hardware for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices
Computer security services, namely, security information and event management (SIEM) in the nature of monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior; managed computer security services, namely, online scanning, detecting, quarantining and eliminating of malware and viruses on computers and electronic devices for the purposes of defending endpoint devices from data tampering and breaches in real-time; software as a service (SAAS) services featuring software for security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; platform as a service (PAAS) services featuring computer software platforms for performing security information and event management (SIEM) being real-time monitoring and threat analysis for protecting data; providing temporary use of non-downloadable computer software for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; providing temporary use of non-downloadable computer software for the automation of tasks in the field of security and network incident remediation; managed computer security services, namely, security threat analysis in the nature of monitoring, reporting, analyzing, and remediating of events collected from computer network and security devices for the purposes of protecting data and restricting unauthorized network access; computer security consultancy in the field of security incident and breach response and remediation; computer security consulting, namely, computer and network security assessment and testing services to diagnose areas of vulnerability and risk to prioritize remediation; providing temporary use of on-line non-downloadable cloud computing computer and network security software for network and application security for the purposes of protecting data and restricting unauthorized network access; software as a service (SAAS) services featuring software for hosting of computer and network security software for use by others for monitoring, collecting, analyzing, correlating, orchestrating, and presenting real-time and historical information collected from computer network and security devices for computer and network vulnerability management, event log management, policy compliance reporting, incident investigation, threat detection, asset management, security compliance, incident remediation, anti-virus protection, and user and entity behavior analysis; computer software and computer management security services in the field of malware and virus prevention, detection, containment, investigation, and remediation for the purposes of defending endpoint devices from data tampering and breaches in real-time