Trademarkia Logo

Canada

C$
SYTECA
FORMALIZED

on 8 May 2025

Last Applicant/ Owned by

Syteca, Inc.

60 Kendrick St. Suite 201Needham MA 02494

US

Serial Number

2397450 filed on 20th Mar 2025

SYTECA

Trademark usage description

downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems fo Read More

Classification Information


Class [009]
Downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; downloadable software for use in auditing of computer systems for cyber security threats; downloadable software for regulatory compliance of computer systems and computer systems audits; downloadable software used for simple and integrated video format reporting for live cyber incident response; downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user activity; downloadable software for managing user software licenses featuring affordable floating licensing subscriptions; downloadable software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; downloadable software for configuring manual approval during login, enforcing endpoint access restrictions, and ensuring that only authorized users can access critical systems; downloadable software to manage and monitor privileged accounts and their access to systems and data within a network; downloadable software for managing credentials, passwords, and privileged data, to ensure secure access to databases, operating systems, and web-based IT resources; downloadable software for controlling remote access to privileged accounts with real-time monitoring and session recording, to ensure compliance and security; downloadable software for implementing multi-factor authentication used to verify and manage privileged user identities; downloadable software used for integrating with directory services for the centralized management of privileged accounts across on-premises and cloud environments; downloadable software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; downloadable software for real-time monitoring and threat detection of privileged account activities, with automated response capabilities for security incidents; downloadable software for integration with third-party applications and cloud services, used to allow seamless integration with ticketing systems, SIEM tools, and other IT management systems; downloadable software for enforcing identity policies across diverse IT environments and ensuring authorized access to sensitive data and systems; downloadable software for securely storing and managing individual user credentials in a personal password vault.


Classification kind code

12

Class [042]
Development and implementation of software solutions for universal and network protocol diagnostic monitoring; monitoring of computer systems for detecting and analyzing user-based insider threats to data; monitoring of third-party contractors and other business partners computer systems for cyber security threats to data; development of customized software for others for use in regulatory compliance and in auditing of computer systems for cyber security threats; providing temporary use of on-line non-downloadable software tools used for simple and integrated video format reporting for live cyber incident response; providing temporary use of non-downloadable software for conducting a multi-factor search of computer systems cyber threats and generating corresponding reports; development of customized software for others for user software license management featuring affordable floating licensing subscriptions; providing temporary use of non-downloadable cloud-based software as tools for monitoring insider computer security; software as a service (SaaS) services featuring software for monitoring user activity on computer systems and computer servers; software as a service (SaaS) services featuring software for privileged access management used to manage and monitor privileged accounts and their access to systems and data within a network; software as a service (SaaS) services featuring software used for managing credentials, passwords, and privileged data, and for ensuring secure access to databases, operating systems, and web-based IT resources; software as a service (SaaS) services featuring software for controlling remote access to privileged accounts, equipped with real-time monitoring and session recording to ensure compliance and security; software as a service (SaaS) services featuring software for implementing multi-factor authentication used to verify and manage privileged user identities, equipped with dynamic privilege adjustment based on risk; software as a service (SaaS) services featuring software for integrating with directory services for centralized management of privileged accounts across on-premises and cloud environments and for providing unified audit trails and reporting; software as a service (SaaS) services featuring software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; software as a service (SaaS) services featuring software for real-time monitoring and threat detection of privileged account activities, equipped with automated response capabilities for security incidents; software as a service (SaaS) services featuring software for enforcing identity policies across diverse IT environments, and for ensuring authorized access to sensitive data and systems; software as a service (SaaS) services featuring software for securely storing and managing individual user credentials in a personal password vault, and for ensuring compliance with security policies; software as a service (SaaS) services featuring software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; software as a service (SaaS) services featuring software for configuring manual approval during login and for enforcing endpoint access restrictions to ensure that only authorized users can access critical systems; software as a service (SaaS) services featuring software for session recording and for playback used to enable administrators to review user actions on endpoints for compliance audits and security investigations; software as a service (SaaS) services featuring software for integration with third-party applications and cloud services to allow for seamless integration with ticketing systems, SIEM tools, and other IT management systems; software as a service (SaaS) services featuring software used for endpoint activity monitoring, providing detailed reports on application usage, web browsing, and other user activities to support productivity and security analysis; software as a service (SaaS) services featuring software for automating policy enforcement across user sessions and ensuring consistent application of security controls across all managed endpoints; software as a service (SaaS) services featuring software for the centralized management of privileged user sessions, used for role-based access control and user session termination.


Classification kind code

12

Mark Details


Serial Number

2397450

Mark Type

Trademark

Legal History


Action TakenStatus
Submitted for opposition 257
on 8th May 2025
Designation Notification - Madrid Protocol
Submitted for opposition 1
on 8th May 2025
Created
Submitted for opposition 31
on 8th May 2025
Formalized
Submitted for opposition 30
on 20th Mar 2025
Filed
Submitted for opposition 228
on 20th Mar 2025
International Registration