Serial Number
98023802
Owner
Authentik Security Inc.Attorney
Brian J. FocarinoFirst Use Date
Jan 31, 2024
Filing Date
Jun 1, 2023
AUTHENTIK SECURITY Trademark
Serial Number: 98023802 • Registration: 8005615
Trademark Classes
Owner Contact Info
Legal Representation
Correspondence Address
Brian J. Focarino COOLEY LLP
1299 PENNSYLVANIA AVENUE, NW, SUITE 700
ATTN: IP Docketing Department
WASHINGTON, DC 20004
United States
Trademark Details
Filing Date
June 1, 2023
Registration Date
October 28, 2025
First Use Anywhere
January 31, 2024
First Use in Commerce
January 31, 2024
Published for Opposition
October 8, 2024
Goods & Services
Technology research for others in the field of cyber security, data and information security, and computer or telecommunication network security; product research and development services for others in the field of cyber security; technical consulting services in the field of cyber security, namely, technical consulting in the fields of datacenter security architecture, datacenter architecture, information technology architecture and infrastructure, enterprise information technology architecture and infrastructure, and public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, analyzing cyber security technology requirements of others and developing recommendations for the computer software and systems and other technology needed to meet those requirements, technological consultation in the field of selecting appropriate cyber security technologies that meet business and technical requirements; computer consulting services regarding implementation and integration of information technology solutions in the field of cyber security, namely, consultancy and information services relating to information technology architecture and infrastructure, consulting services in the field of design, selection, implementation and use of computer network security hardware and software systems for others; managed computer security services, namely, providing computer security threat analysis for protecting data, computer security consultancy, computer network security consultancy, testing, analysis, and evaluation of computer network security software to assure compliance with industry standards, and scanning and penetration testing of computers and networks to assess information security vulnerability; managed computer security services, namely, malware mitigation in the nature of scanning, detection, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, and malware; computer network security services and communications network security services for network intrusion protection, namely, monitoring of computer systems for detecting unauthorized access or data breach, Scanning and penetration testing of computers and networks to assess information security vulnerability, managing endpoint security on networks by enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, computer security threat analysis for protecting data, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices, computer forensic services and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non-downloadable cyber security software for restricting unauthorized access to computer systems; computer security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of software for the creation of computer network firewalls, virtual private networks, and for detecting unauthorized computer system access or data breach; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities