`
`
`
`Sent: 9/10/2020 4:41:47 PM
`
`
`
`To: TTAB EFiling
`
`
`
`CC:
`
`
`
`Subject: U.S. Trademark Application Serial No. 87697680 - NETARGOS - TM1215US00 - Request for
`Reconsideration Denied - Return to TTAB - Message 2 of 6
`
`
`
`
`
`
`
`*************************************************
`
`Attachment Information:
`
`Count: 14
`
`Files: 4-1.jpg, 4-2.jpg, 4-3.jpg, 4-4.jpg, 4-5.jpg, 5-1.jpg, 5-2.jpg, 5-3.jpg, 5-4.jpg, 5-5.jpg, 5-6.jpg, 6-1.jpg,
`6-2.jpg, 7-1.jpg
`
`
`
`
`
`
`
`l-umJ/accgdun con-fen um:Hell:may»:rhaamttr-Iuwonfimec' on/
`
`WEB/ZED 13 49.22 PM
`
`ACCEDMN --:
`
`.ti 0 n
`
`'
`
`[5 DUI heun eliminated. The virtual attack surface is ever inrr
`
`Vihihilily is shrinking. Enter behavior-based inlrusiun
`
`The perimeter is gone‘ How do you protect data Without limits?
`
`In 1019 m lxfiage can an Am brad! H.155] a: milhnn m lu'mding m ram 20.: a Bragg umr m nauAIIy tdcymfy 3 mm. was 105 am m same ye)!
`
`
`splunk>
`
`
`
`
`
`
`
`lI|||19JJaC¢£d|anmum ultune’bAhawcxrhasedrr-IluctomE-Lac' W
`
`WEB/WED 12 49.22 PM
`
`nap." many nu mm m It mum recmmugy, seclmry bunches pmm and m m fact mamug m menu; As more huslnes‘; as umducled unlmE, the mm! muck iun‘ace.
`(m alarm u I“! 3 mm I'm mm “In-M nl’ 11w “-31 ”In rm rm “aw urn)
`which represent: the numbel ofpulennal breach pwmls. exyands npmly mu. m mama; dzguul business pandxgm. atemmmns hm e alw mum: mule mum am e av sum;
`new u m m mm nerwmk gamete: (teams and cm at man tracks mate they hm gamed nines;
`Read me solumn tuner —)
`
`Do you know ifyour network has been breached?
`Ndumk penmflrx plukthun has matastd m snphlslltnhnn making .1 mute Man.“ 1.: mm. m: puma“ .1th hm “mum m.- c
`3155 became mm saphasumted m an: mnhnds mu- use In break mm nznl'nrks and mm :31 Cr men nazks m mask men mu mes rm; :5 “IN
`[T gamma: solulmns alune um um mnugh
`Next-germahm mlrunon oelecnan x: allabout vercamex lsmlm- II «has on nem‘ork uamc mlalismlechnalog,‘ mahspurpose-buzl! Em
`puth nuud mam-mu: m mun-n“ [he 1mm \mhlhl} Lhal oik‘u mulls m Elms: an “mm; sung“ powflcd 5 mm; pmktb
`n5...“ mm, and Mama .1“. a“... a.” nqunm..m\ t, and; m Lurad‘ am pmmmr I: pm, .dn am “mm.“ [m nu mumk
`:mnrrnuns
`
`thrfinmh and Faqur fur complete Ihrcar dmmuu. mrludmg signamru anmnahi‘z, andhrhanura All I‘M Maud
`
`.
`
`'
`
`.
`
`.
`
`.
`
`-
`
`-
`
`about the data
`
`
`
`-‘
`
`‘
`
`thn it comes to increasing IT security protection, it’s all
`
`
`
`
`
`||||p9 J/accmuau cu urea ulluue’b:haw-fiera-sedrl‘llu'; owns:- w 2 49.22 PM
`
`
`
`Secure the entire virtual attack surface with a pervasive.
`economical solution before it’s too late
`
`Cloud mmpmmg, ml:
`and luT hmmmamam changed me nay blames) h Mdfltlfl) Secmir} [meals are ewlung mm mute
`sum-hum“: mack \ eclun idlu>l=d m :umplex nemulh. \- ulmmlmes u “Jun um :nfllvuse nuumk mg: can be explored by
`‘Vln-rrnmmais. Brllm mphmrt nrmm \mffir analnwi‘ unhkr irgvnmrwhawd arr Ahlr m drum \mknnu n mark-z a» mu .1» mudmmzm»
`nithlnguurnemwk
`[.1 arder (D be pen m a Sin hghx mm. full name puke: (in: .m (unpack maids“, m; 1319“ . m mW; a.” “wage but mndmue
`lusmnml mm: making swim Meal fol lodn ‘5 Examine mm and pflunflerrless and 5mm
` mm“ lurking nn m.- uur n gin-I1 vmnllr pmme m mm my
`Skylighi [Innrn-d €N‘unn'
`s nrmmk (mffir mipm rzn llt‘lp .pm a
`names! Niche) amour nemmk mm an agile ea,
`m-flaploy ton-effleh e qua gemnn' gallium
`Read more —)
`
`
`
`
`
`\mgm ms mlunofls require complave mi menus dam, m pnmal, sampled am The :mgle gonna 09mm. «01 my IT em Homer“ is
`new ark mm: Han} uenmrk amass mun or an) mum“; helm m. rakes plate. a can be :hom: m m mm and dam
`Tu pm Id: mum um" um] mm b:ha'.'|ur dclccnrm mow arm: Irmamlmu cm mum d1: mmurk mun b: mmh zzd rm cnmvki:
`mam-y “1mm rharscnpe all am“ pmmm nrnl'nrk layers mun b: Kannnedm adhere «m goal Sin-light drluL-rs an Yhavpramlsr
`5m llghl examine; ex-m-mg on me \me for camping my. ddinmon mm: m-
`
`
`
`
`
`
`
`lI|||19JJaC¢£d|anmum undue/125mmwasedrr-Irue‘ommac' W
`
`WEB/WED 12 49.22 PM
`
`s etlremely eac
`light \
`“‘Accedian 5
`Nu‘k Rn}, 3mm hpflmhal Splnuk
`
`. plunk'>
`ea wh Splunk added Accedmn Skyhght pa“
`
`a
`
`gained from one app for users.“
`
`.
`
`"
`
`'
`
`Fssemials
`
`ex Smned mm (11: Flea Duwulamd 0t Accedm
`
`
`
`
`
`splunk>
`
`
`
`
`
`
`
`—n—§—'1-
`Guide
`Blog
`Onrdemand “'ebinar
`New-Gen rmmmn Deterrinn‘ f‘nmflPmemmf Perimnwr Pmm'fiwflrmmhfy‘wrlm ‘Fw Vendnr nmmamwmmnmfimmmum Fuomial: + Achm-I swig“! inerpd Qemwity
`
`
`ACCEDIAN
`5:15
`Sllppml
`Pamus
`
`3‘:th Plaxfunn
`Rzmurtcs
`Wan-h a Demo
`Fm Tum
`
`Nnvsronm
`E‘m’m
`Camus
`
`Sum L'p —)
`
`
`
`
`
`
`
`
`
`
`
`sklpmconun
`
`..
`E MON
`
`Pnduns
`
`suhnws&1uCam lnlegzlfiuns
`
`5mm:
`
`11mm“:
`
`Luglrl
`- Seam
`Pan-m \Vsyrinmn M
`
`FireMon Lumeta
`agamanl toms far cloud and physical networks \imit visrbility of shadow networks and clouds that wrll harbor unknown threats. See how you can gain real-trme v
`
`y to identrfy afld elimmate your hybrid m
`
`See How
`
`Your EmaH Address *
`
`About Lumeta
`Lumeta is a real-llme vislbmry. vu‘nerabmty‘ and r‘sk management so‘ulion mar enab‘es
`mud. network, and secunty teams tofind and secure unknown‘ rogue and shadow
`c‘nuds‘ network infraslmclure, and endpoinls,
`
`
`
`
`
`
`
`
`
`How Lumeta Helps You
`LUHETAw...“ n -
`a...
`
`.,...
`
`Real-Time Situational Awareness
`Galn Ieal-tlme vlslblllty Into your dynamic lnlraslmcture
`Including cloud, vlrtuali physical, saltware—defined network
`Infraslmclure. endpoints and Operational technology (OTlllntemet of
`Thlngs lloT). With Lumela‘ you can eliminate 100% afyour blind spols
`and monitor changes or unusual behavlors to eliminate any gaps In
`coverage that may leave you exposed.
`
`--~-—-
`
`
`
` 100% Hybrid Cloud Visibility
`
`
`
`
`
`
`
`
`
`
`
`1
`
`Q:
`I. gunman” i
`
`
`..._..___.... ia
`
`Real-Time Breach Detection
`Lumen manners me nynnu minimise signs among
`EM and prioritizes tunings Int Invattgaltnn and remediation With
`Lumaa, your Wt intelligence fads ale made actionabie I0 wirelate
`a comprehensive understanding or your enterpnse's active lP adore“
`some against known threats as new threat data becomes evaluable,
`and as new endpoints connect in the network,
`
`
`
`
`
`Lumetz dimmers, m and aw on topology dlanges anus the
`entire hybrid enterprise. mudlng mum-aloud environments. Delivering a
`holistic View across all at yvur physifil and viriuatlctuud irifiastrudmres,
`Lumeta CIDUdViSlbllily prches an authoritative perspeaive tor your
`enterprise seculity operations center (SOC) In priolttize issues tor
`remediation and ensure network piulculiun.
`
`uuueu
`mu...
`3....-
`
`u“ _, .e.
`
`.7”
`
`..
`
`.
`
`,
`
`e-.—
`
`.__,
`.. V
`
`
`
`
`
`
`
`
`
`
`
`Identify Leak Paths
`Lumela dreamers and monitors every cloud acouunl, netwudr. path and
`endpuint for changes in real-lime to idemily new \eak paths that are
`often due to misconfigurations or malicious activily‘ Lumela finds
`inbound and oulbound iealc paths to the internel, virlual private cicud. in
`between network-segmented‘ firewalled enciavesr or across ioT/OT
`environments,
`
` Llu‘rgg‘rg
`mm
`any».
`l-
`m...
`
`me h .
`
`”W.
`n.
`
`we
`
`Recursive Network Indexing
`Lumela uses a unique patent-pending technaiogy lo produce a
`comprehensive network summery that includes a recursively crawling
`cycle aflargeling‘ Indexing‘ iracing‘ monitoring. profiling and displaying
`a network's slate. Through passive and active methods, you gel a View
`ur yuu: enme- Infrastructure, Including cloud Insranues and asset: as
`well as all |Fv4lvafi cannemicns and devices.
`
`
`
`
`
`
`
`
`
`mnmmmmmmmm‘mmummmgjmm‘ 3,me
`
`Lumeta Resources
`
`
`
`—-_
`LUMETA
`ms Narlh Anna-inn loT Cyhcmunw
`'ll-clmnlugy lunnvauvn Award
`
`“ ka
`Lumeta on AWS MarketplaceLUmela'S nemnm-mlmmmmmmmwmmmmmm
`
` Request a Demo
`
`
`
`
`
`
`
`
`
`lilllfi'zflvmwjleD’LCWi'nJNuCJGIMnelN
`
`RENEW lZEl .l 3 PM
`
`FireMon solutions blend powerful realitirne security analysis with automaied workflows to
`deliver field-1951811, CIDUd-EECUfEd nelwnrk secun'ty policy management for your hybrid
`enterprise. See for yourself.
`
`Request a Demo
`
`F I R E M QN
`
`E: lflfalfg lremamcom
`,
`F: +1 913 948 Sam
`
`n a a
`
`FlreMon
`'
`
`q.‘ I.
`'y
`Firewall Secw [V
`
`Nel‘QOlK
`JFIW
`
`rlll'w’y'llll Run»
`‘ “w
`l.-l|:'osegrienlallm
`
`Company
`Leadersn p
`wawm
`harem;
`
`sales
`
`W“,
`
`Services
`a Unai Ssvces
`namrg 59w;
`
`@ 2020 l—IraMan LLC Allr‘gmsleservea
`
`Products
`His-Von Ailomal rm
`bemnty Mawga'
`(alum paw
`
`F‘H 3-4-1“ I"
`[,lnnlmll-i
`p.H 3.0m ”m
`L
`.v : m
`H w m “pl--
`
`w T” rm uhlw
`
`
`
`
`
`
`
`
`
`
`
`FIREMQ.]\|
`
`Fmduns
`
`Sollniun:&UuClsn
`
`Integvanims
`
`5min:
`
`Remakes
`
`Partner:
`
`Why Finn“
`
`Logm - Search
`Bet Slant-d
`
`- was ncuurmn m onmrmwty fly "2ng
`
`; nun-n- Hml‘”
`Hey there
`wondermg what In autumn: hem By
`aummvm your mum panties you can
`amew
`- 90% Efficiency glam by amomallng firewaH
`“ppm!
`- 90$; Ream-on m menau rule mew [me
`
`
`
`Risk Management
`The best way to combat unwarranted access is to preemptwely \dantify and shah,»
`vulnerability, However= the complex nature of 5 My
`llcies combined WIW th
`uflt to
`consuming burden of palchlng lens of Ihousands. of wh’ue-rabilities make: thr als. dwf‘f
`see and assess See how FireMon can help you manage
`k with reaktime ' gwbilm, and
`conlral to remedxale the vulnerabilmes that malter me most
`
`Vour EmaH Addmss "
`
`Sea Haw
`
`
`
`
`
`
`
`
`
`. w.“ .mwuumw‘w w, u,
`unneam nrewau was
`
`“MU
`
`
`
`How F reMon Helps You Manage R sk
`
`
`
`
`
`
`
`
`
`
`
`Score Attack Simula Ions
`FIreMun can some all attack simulations for risk and Impact and Ihen
`score once you've made improvements to determine the Impan
`changes We mu m‘culale the ram] arvulneramnies nut expnsed by
`me Me In the Intel numnar of potennal vulnelaunmes‘ plus asset va‘L
`and afleat muIleHers You can get a wmp‘ele some 0| your neMMI
`with a user dashhuard ma! gives you reaHime visihilily 01 your risk
`puslure by policy rule and assel.
`
`my men:
`wununna mm m ammm mm By
`amummlng ‘mur secumv mucus yuu can
`amine
`. 50% Embency 9am a; amomaI-ng mm
`suppult
`- 90s; Reducl'nn in mewau rule cleahon lime
`' 40% nnnuclm In oommoxuy ny mmmg
`unneeded nrewau mas
`
`
`
`
`
`
`
`
`
`Lenovo Pc a TABLETS
`
`FHDNES
`
`Dam cENTER
`
`SMART DEVICES
`
`9 Sululunt
`
`a 59w:
`
`SERVICESI. summons
`ABDUT LEIIovo
`E b Ntmllm'lg Q Sull'hal! Dufinsd mlwmume 5 Saw-alts
`
`Lam: l analwr E‘
`{E} Suppm'
`
`
`
`rm -
`.
`l. mnn M
`| CuniaxlUE 5)
`Acmunl f»
`
`Q
`l um i!
`
`Storage
`Easy to manage, simple to scale,
`always available
`«mm a U“! pmlm,
`-
`Luunl m Leuknu m: rump“ ,
`adammwuxnn mzwmalmmunmeutijmp. ‘ u. mum:
`budntl ind :nsurtda ,
`; rcmh' um. Wu .-
`
`
`
`-
`
`
`
`

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site