HIFENCE Trademark Information

Trademark by HIFENCE LLC

Computer hardware diagnostic services; computer network diagnostic services; computer network security policy assessment; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recomm...

Classification Information

Use in Commerce Trademark - Applicant has provided proof of use of this mark in commerce to USPTO.

Primary Class: Class Details:
Class (042)
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
First Use Anywhere:: 4/11/2021
First Use In Commerce: 4/11/2021
General Information
Word mark: HIFENCE
Status/Status Date:
NEW APPLICATION FILED
11/20/2021
Serial Number: 97124162
Filing Date: 11/14/2021
Registration Number: NOT AVAILABLE
Registration Date: NOT AVAILABLE
Goods and Services: Computer hardware diagnostic services; computer network diagnostic services; computer network security policy assessment; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultancy; computer security policy assessment; computer security, namely, cybersecurity policy assessment; computer security, namely, data security policy assessment; computer security, namely, firewall security policy assessment; computer security, namely, hardware security policy assessment; computer security, namely, information technology security policy assessment; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer software and hardware password maintenance services; computer software maintenance services; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity computer software maintenance services; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; data security computer software maintenance services; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; firewall computer software security maintenance services; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security, namely, security threat analysis for protecting data; technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security, namely, security threat analysis for protecting data; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of non- downloadable software for security operations center management; security policy assessment, namely, data security consultancy; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; support services, namely, troubleshooting of computer software security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Mark Description: NOT AVAILABLE
Type Of Mark: Service Mark
Published For Opposition Date: N/A
Last Applicant/Owner:
HIFENCE LLC
********
********
***** ****
Mark Drawing Code: Standard Character Mark
Design Search:
(NO DATA)
Register Type: Principal
Disclaimer: (NOT AVAILABLE)
Correspondent:
********
********
***** ****
Current Status:
NEW APPLICATION FILED
11/20/2021
Correspondent Search:
RANDY MICHELS is a correspondent of HIFENCE trademark.
Current Overall Rating:
RatingRatingRatingRatingRating

(0 review)

As seen on