TZ Trademark
Serial Number: 79396156 • Registration: 7805665
Trademark Classes
Class 9 - Computers & Electronics
Scientific, nautical, surveying, photographic, cinematographic, optical apparatus and instruments
Class 41 - Education & Entertainment
Education; providing of training; entertainment; sporting and cultural activities
Class 42 - Computer & Scientific
Scientific and technological services; industrial analysis and research services
Owner Contact Info
Legal Representation
Correspondence Address
Katrin Lewertoff Lewertoff IP Law Group, LLC
2 Park Avenue, 20th Floor
20th Floor
New York, NY 10016
United States
Trademark Details
Filing Date
January 11, 2024
Registration Date
May 27, 2025
Published for Opposition
April 8, 2025
Goods & Services
Education and instruction services, namely, conducting instructional classes in the fields of cybersecurity risk management, IT observability, IT operations and telemetry in particular for building distributed data pipeline and data lake architectures to collect, process, enrich, and store event data for the purpose of detecting, analyzing, hunting for and responding to cyber threats in digital networks; organization and conducting of conferences, exhibitions, and competitions in the field of cybersecurity risk management, IT observability, IT operations and telemetry
Computer security consultancy in the field of security operations, digital forensics and incident response; hosting software for use by others and software as a service (SaaS) featuring software for use in monitoring and managing cyber security operations, cyber threat monitoring, and cyber risk management; software as a service (SaaS) services featuring software for use in monitoring cybersecurity operations, cyber threat monitoring, and cyber risk management; rental of software for use in monitoring cyber security operations, cyber threat monitoring, and cyber risk management; cloud computing featuring software and managed cybersecurity services being the provision of online, non-downloadable software, both for the collection, enrichment, processing and storage of data relating to cyber security operations, cyber threat detection, and cyber risk management, in particular gathering data to measure, benchmark, and report on cyber risk indicators and metrics; technical support services for remote administration and management of in- house and hosted cyber security operations and cyber risk management software, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; providing online, non-downloadable software and managed cyber security services for building distributed data pipeline and data lake architectures to collect, process, enrich, and store event data for the purpose of detecting, analyzing, hunting for and responding to cyber threats in digital networks and IT-systems, namely, computer security threat analysis for protecting data
Electronic databases in the fields of cybersecurity, IT observability, IT operations and telemetry, recorded on computer media; downloadable interactive databases in the fields of cybersecurity, IT observability, IT operations and telemetry; downloadable computer software for the collection, storage and processing of data relating to cybersecurity, IT observability, IT operations and telemetry; downloadable computer software for the detection of and response to cyber threats; downloadable computer software for the development, deployment and management of IT security operations architectures for the purpose of detecting, analyzing, and responding to cyber threats; computer networking and data communications equipment for the purpose of inspecting network traffic and data for malicious activity in digital networks and IT systems; downloadable computer software for the collection, processing, and storage of data relating to cyber security operations, cyber threat detection and cyber risk management; downloadable computer software for building distributed data pipeline and data lake architectures to collect, process, enrich, and store event data for the purpose of detecting, analyzing, hunting for and responding to cyber threats in digital networks and systems