METHOD SECURITY Trademark
Serial Number: 98886631
Trademark Classes
Owner Contact Info
Legal Representation
Correspondence Address
Carissa L. Weiss Law Office of Carissa L. Weiss, PLLC
745 Fifth Avenue, Suite 500
New York, NY 10151
United States
Trademark Details
Filing Date
December 5, 2024
Registration Date
Not Registered
Published for Opposition
July 22, 2025
Goods & Services
Downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Downloadable software featuring artificial intelligence agents to provide assistance with cybersecurity tasks and workflows; Downloadable software featuring artificial intelligence agents that can communicate with users through natural language and voice, understand and categorize user priorities, create plans to execute work, and automate tasks on the user's behalf
Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, asset protection, insider threat detection, cyber security programs, and integration; Technological consulting in the field of cybersecurity, security, counterintelligence, asset protection, insider threat detection, cyber security programs, and integration engineering; Providing temporary use of online, non-downloadable enterprise software for network-connected device management and providing network security, ensuring security compliance, scanning networks for threats, threat detection, and segmentation of networks; Providing temporary use of online, non-downloadable software for connected asset discovery, intelligence sharing, asset tracking, database management, cybersecurity management, and vulnerability management; Providing temporary use of online, non-downloadable software, namely, software featuring artificial intelligence agents to provide assistance with cybersecurity tasks and workflows; Providing temporary use of online, non-downloadable software, namely, software featuring artificial intelligence agents that can communicate with users through natural language and voice, understand and categorize user priorities, create plans to execute work, and automate tasks on the user's behalf