AVATIER
Mark Identification

AVATIER

Serial Number

99706786

Filing Date

Mar 17, 2026

Trademark by

AVATIER

Classification Information

Downloadable software for computer system and network password management, including auditing and reporting, intrusion detection, and user identity verification and help desk services related to password management; Downloadable software for employee lifecycle management, including provisioning of, auditing of, and reporting related to information technology services, management of assets, employee responsibilities and tasks, and employee workflows, and including automated creation, modification, and deactivation of user accounts and access privileges across enterprise systems in response to lifecycle events; Downloadable software for controlling and monitoring access to computer systems, computer networks, software applications, and data, including authentication of user identities and monitoring and reporting of compliance with access requirements, performance of information technology audits and tracking of audit compliance history; Downloadable software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; Downloadable software for access control management of human and non-human digital identities; Downloadable software for securing, auditing, monitoring, reporting and analysis of computer systems, computer networks, cloud computing environments and enterprise software applications; Downloadable software for detection, analysis and remediation of cyber threat; Downloadable software for identity governance, namely, software for policy-based access control, automated access certification, segregation-of-duties enforcement, and audit reporting relating to user access to enterprise systems and applications; Downloadable software for authenticating user identities using passwordless, biometric, token-based, and multi-factor authentication mechanisms; Downloadable software for monitoring and reporting compliance with information security policies and regulatory requirements relating to access control and identity management; Downloadable software for management of human and non-human digital identities

Electrical and Scientific Apparatus

Software as a service (SAAS) services featuring software for computer system and network password management, including auditing and reporting, intrusion detection, and user identity verification and help desk services related to password management; Software as a service (SAAS) services featuring software for employee lifecycle management, including provisioning of, auditing of, and reporting related to information technology services, management of assets, employee responsibilities and tasks, and employee workflows, and including automated creation, modification, and deactivation of user accounts and access privileges across enterprise systems in response to lifecycle events; Software as a service (SAAS) services featuring software for controlling and monitoring access to computer systems, computer networks, software applications, and data, including authentication of user identities and monitoring and reporting of compliance with access requirements, performance of information technology audits and tracking of audit compliance history; Software as a service (SAAS) services featuring software for human and non-human digital identities; Software as a service (SAAS) services featuring software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; Software as a service (SAAS) services featuring software for access control management of human and non-human digital identities; Software as a service (SAAS) services featuring software for securing, auditing, monitoring, reporting and analysis of computer systems, computer networks, cloud computing environments and enterprise software applications; Software as a service (SAAS) services featuring software for detection, analysis and remediation of cyber threat; Software as a service (SAAS) services featuring software for identity governance, namely, software for policy-based access control, automated access certification, segregation-of-duties enforcement, and audit reporting relating to user access to enterprise systems and applications;; Software as a service (SAAS) services featuring software for authenticating user identities using passwordless, biometric, token-based, and multi-factor authentication mechanisms; Software as a service (SAAS) services featuring software for monitoring and reporting compliance with information security policies and regulatory requirements relating to access control and identity management

Computer and Scientific