WITHSECURE
LIVE

Serial Number

97099822

Owner

WITHSECURE CORPORATION

Attorney

Kathryn Starshak

Filing Date

Oct 29, 2021

Add to watchlist:

No watchlists yet
View on USPTO

WITHSECURE Trademark

Serial Number: 97099822 • Registration: 7381366

WITHSECURE is a trademark filed by WITHSECURE CORPORATION on October 29, 2021. The trademark is classified under Class 9 (Computers & Electronics), Class 38 (Telecommunications), Class 41 (Education & Entertainment), Class 42 (Computer & Scientific), Class 45 (Legal & Security Services), Class 35 (Advertising & Business). The application is currently registered and active.

Owner Contact Info

WITHSECURE CORPORATION (9 trademarks)

PL 24, TAMMASAARENKATU 7
HELSINKI 00181 , FI

Entity Type: 03

F-Secure Corporation (19 trademarks)

Tammasaarenkatu 7

Entity Type: 03

Trademark Details

Filing Date

October 29, 2021

Registration Date

May 7, 2024

Published for Opposition

June 20, 2023

Goods & Services

Educational services, namely, conducting seminars, conferences and workshops in the field of cyber security; providing of training in the field of cyber security; Arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable, namely, manuals featuring information technology in the field of cyber security

Downloadable software and software applications for cyber security purposes; Downloadable software platforms for cyber security purposes; Downloadable software and software platforms for detecting and responding to cyber threats and attacks; Downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; Downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; Downloadable software and software platforms for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; Downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; Downloadable software for use of virtual private networks (VPN) for use in for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Cloud servers; Downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Wireless routers; Computer network routers; Computer hardware; Computer peripherals; USB hardware and USB sticks in the nature of pre-recorded USB flash drives featuring a platform for cyber security purposes ; Downloadable USB operating software; Downloadable software and software device drivers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security

Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to a global computer information network on the Internet; data transfer rerouting by telecommunications; secure data transfer via computer networks by telecommunications; information, advisory and consultancy services relating to all the aforementioned services, namely, telecommunications

Business management consulting services in the field of information technology; Data processing, systematisation into computer databases and database management; Collection of data, namely, electronic data collection for business purposes in the field of information technology; Computerised data processing; Management of computer databases and compilation of information into computerised databases; Information, advisory and consultancy services relating to all the aforesaid services, namely, business management consulting and business advisory

Licensing of technology, namely, licensing of intellectual property in the field of patents and copyrights; Licensing services, namely, licensing of software

Scientific and technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks for others in the field of cyber security; development of new technology for others in the field of cyber security and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; technology consultancy in the field of cyber security, Internet security, computer security, computer network security and data security; researching, designing, developing, implementing, maintaining and updating software in the field of cyber security and information security, including software for scanning, monitoring, analyzing and managing computer systems, the Internet, and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; researching, designing, implementing, maintaining and updating software in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection software; researching, designing, implementing, maintaining and updating software in the field of data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; network protection services in the nature of computer network security consultancy; data compression of computer data; data leakage prevention services in the nature of computer network security consultancy; IT services in the field of cyber security, namely, data security consultancy; IT consultancy, advisory and information services; IT security, protection and restoration services in the nature of computer network security consultancy; Information technology support services in the nature of computer network security consultancy; technical support services relating to computer software and software applications, namely, troubleshooting of security software problems; monitoring of network and computer systems for security software problems for quality control purposes; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes for security software problems for quality control purposes; Providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PaaS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IaaS)featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud services, namely, cloud computing featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; quality control for others and authentication services in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security

Filing History

TEAS CHANGE OF CORRESPONDENCE RECEIVED
Jan 24, 2025 TCCA
TEAS CHANGE OF DOMESTIC REPRESENTATIVES ADDRESS
Jan 24, 2025 ECDR
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Jan 24, 2025 ARAA
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Jan 24, 2025 REAP
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED
Jan 24, 2025 CHAN
TEAS CHANGE OF OWNER ADDRESS RECEIVED
Jan 24, 2025 COAR
NOTICE OF REGISTRATION CONFIRMATION EMAILED
May 7, 2024 NRCC
REGISTERED-PRINCIPAL REGISTER
May 7, 2024 R.PR
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
Mar 30, 2024 SUNA
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
Mar 29, 2024 CNPR
STATEMENT OF USE PROCESSING COMPLETE
Feb 28, 2024 SUPC
CASE ASSIGNED TO INTENT TO USE PARALEGAL
Feb 24, 2024 AITU
USE AMENDMENT FILED
Feb 2, 2024 IUAF
TEAS STATEMENT OF USE RECEIVED
Feb 2, 2024 EISU
NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Aug 15, 2023 NOAM
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Jun 20, 2023 NPUB
PUBLISHED FOR OPPOSITION
Jun 20, 2023 PUBO
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
May 31, 2023 NONP
LAW OFFICE PUBLICATION REVIEW COMPLETED
May 16, 2023 PREV
APPROVED FOR PUB - PRINCIPAL REGISTER
May 9, 2023 CNSA
TEAS/EMAIL CORRESPONDENCE ENTERED
May 8, 2023 TEME
CORRESPONDENCE RECEIVED IN LAW OFFICE
May 8, 2023 CRFA
TEAS REQUEST FOR RECONSIDERATION RECEIVED
May 8, 2023 ERFR
NOTIFICATION OF FINAL REFUSAL EMAILED
Feb 28, 2023 GNFN
FINAL REFUSAL E-MAILED
Feb 28, 2023 GNFR
FINAL REFUSAL WRITTEN
Feb 28, 2023 CNFR
TEAS/EMAIL CORRESPONDENCE ENTERED
Feb 27, 2023 TEME
CORRESPONDENCE RECEIVED IN LAW OFFICE
Feb 27, 2023 CRFA
ASSIGNED TO LIE
Feb 27, 2023 ALIE
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Jan 25, 2023 ASGN
TEAS RESPONSE TO OFFICE ACTION RECEIVED
Dec 16, 2022 TROA
NOTIFICATION OF NON-FINAL ACTION E-MAILED
Jun 17, 2022 GNRN
NON-FINAL ACTION E-MAILED
Jun 17, 2022 GNRT
NON-FINAL ACTION WRITTEN
Jun 17, 2022 CNRT
ASSIGNED TO EXAMINER
Jun 14, 2022 DOCK
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Nov 10, 2021 NWOS
NEW APPLICATION ENTERED
Nov 2, 2021 NWAP