Published trade mark details for 2546164

This information was published on 2025-05-20T09:26:45 for IP Right Acceptance Published.

Field Value
(210) 2546164 (IR 1853484)
(220) 20 Mar 2025
(300) US, 25 Sep 2024, 98768572
(511) (510) Class 9
Downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; downloadable software for use in auditing of computer systems for cyber security threats; downloadable software for regulatory compliance of computer systems and computer systems audits; downloadable software used for simple and integrated video format reporting for live cyber incident response; downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user activity; downloadable software for managing user software licenses featuring affordable floating licensing subscriptions; downloadable software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; downloadable software for configuring manual approval during login, enforcing endpoint access restrictions, and ensuring that only authorized users can access critical systems; downloadable software to manage and monitor privileged accounts and their access to systems and data within a network; downloadable software for managing credentials, passwords, and privileged data, to ensure secure access to databases, operating systems, and web-based IT resources; downloadable software for controlling remote access to privileged accounts with real-time monitoring and session recording, to ensure compliance and security; downloadable software for implementing multi-factor authentication used to verify and manage privileged user identities; downloadable software used for integrating with directory services for the centralized management of privileged accounts across on-premises and cloud environments; downloadable software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; downloadable software for real-time monitoring and threat detection of privileged account activities, with automated response capabilities for security incidents; downloadable software for integration with third-party applications and cloud services, used to allow seamless integration with ticketing systems, SIEM tools, and other IT management systems; downloadable software for enforcing identity policies across diverse IT environments and ensuring authorized access to sensitive data and systems; downloadable software for securely storing and managing individual user credentials in a personal password vault.

Class 42
Development and implementation of software solutions for universal and network protocol diagnostic monitoring; monitoring of computer systems for detecting and analyzing user-based insider threats to data; monitoring of third-party contractors and other business partners computer systems for cyber security threats to data; development of customized software for others for use in regulatory compliance and in auditing of computer systems for cyber security threats; providing temporary use of on-line non-downloadable software tools used for simple and integrated video format reporting for live cyber incident response; providing temporary use of non-downloadable software for conducting a multi-factor search of computer systems cyber threats and generating corresponding reports; development of customized software for others for user software license management featuring affordable floating licensing subscriptions; providing temporary use of non-downloadable cloud-based software as tools for monitoring insider computer security; software as a service (SaaS) services featuring software for monitoring user activity on computer systems and computer servers; software as a service (SaaS) services featuring software for privileged access management used to manage and monitor privileged accounts and their access to systems and data within a network; software as a service (SaaS) services featuring software used for managing credentials, passwords, and privileged data, and for ensuring secure access to databases, operating systems, and web-based IT resources; software as a service (SaaS) services featuring software for controlling remote access to privileged accounts, equipped with real-time monitoring and session recording to ensure compliance and security; software as a service (SaaS) services featuring software for implementing multi-factor authentication used to verify and manage privileged user identities, equipped with dynamic privilege adjustment based on risk; software as a service (SaaS) services featuring software for integrating with directory services for centralized management of privileged accounts across on-premises and cloud environments and for providing unified audit trails and reporting; software as a service (SaaS) services featuring software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; software as a service (SaaS) services featuring software for real-time monitoring and threat detection of privileged account activities, equipped with automated response capabilities for security incidents; software as a service (SaaS) services featuring software for enforcing identity policies across diverse IT environments, and for ensuring authorized access to sensitive data and systems; software as a service (SaaS) services featuring software for securely storing and managing individual user credentials in a personal password vault, and for ensuring compliance with security policies; software as a service (SaaS) services featuring software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; software as a service (SaaS) services featuring software for configuring manual approval during login and for enforcing endpoint access restrictions to ensure that only authorized users can access critical systems; software as a service (SaaS) services featuring software for session recording and for playback used to enable administrators to review user actions on endpoints for compliance audits and security investigations; software as a service (SaaS) services featuring software for integration with third-party applications and cloud services to allow for seamless integration with ticketing systems, SIEM tools, and other IT management systems; software as a service (SaaS) services featuring software used for endpoint activity monitoring, providing detailed reports on application usage, web browsing, and other user activities to support productivity and security analysis; software as a service (SaaS) services featuring software for automating policy enforcement across user sessions and ensuring consistent application of security controls across all managed endpoints; software as a service (SaaS) services featuring software for the centralized management of privileged user sessions, used for role-based access control and user session termination.
(540) SYTECA
(550) Word
(730) Syteca, Inc.

 

Find out more about publications on the About page.