METHOD Trademark
Serial Number: 99316228
Trademark Classes
Owner Contact Info
Legal Representation
Correspondence Address
Carissa L. Weiss Law Office of Carissa L. Weiss, PLLC
745 Fifth Avenue, Suite 500
New York, NY 10151
United States
Trademark Details
Filing Date
August 1, 2025
Registration Date
Not Registered
Published for Opposition
January 27, 2026
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable computer software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Downloadable computer software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf
Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technology consultation in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing on-line non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing on-line non-downloadable software using artificial intelligence (AI) for providing assistance with cybersecurity tasks and workflows; Providing on-line non-downloadable software using artificial intelligence (AI) for communicating with users through natural language and voice, understanding and categorizing user priorities, creating plans to execute work, and automating tasks on the user's behalf