GleanMark is free for all of AprilGet free access
ARCTIC WOLF NETWORKS, INC. logo

ARCTIC WOLF NETWORKS, INC.

42 Marks
Corp.
First Filed:May 27, 2012Latest Filed:Mar 16, 2026Address:8939 Columbine Rd., Suite 150, Eden Prairie, MN 55347, US

Portfolio Overview

Registered
31(74%)
Pending
1(2%)
Dead
10(24%)

Top Classes

Class 42
Software, IT Services & Scientific Research
31(74%)
Class 9
Electronics, Software & Scientific Equipment
16(38%)
Class 41
Education and Entertainment
3(7%)

TTAB Proceedings

Total Proceedings
1
As Plaintiff
1(100%)
As Defendant
0(0%)

Top Firms

Davis Wright Tremaine LLP(Jul 2022)
23
BARNES & THORNBURG LLP(Nov 2024)
17
Michael Bean Trademark & Cop...(Dec 2017)
1

Trademark Activity Timeline(2012 – 2026)

Trademark Portfolio

42 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
AW
AW
Service Mark
Stylized
ITU
PENDING
Owner:
Serial:99704290
Filed:Mar 16, 2026
Classes:42
AURORA
AURORA
Service Mark
Word
REGISTERED
Owner:
Serial:98871520
Filed:Nov 25, 2024
Classes:42
Registration:8098803
Registered:Jan 13, 2026
Goods & Services
providing temporary use of non-downloadable software featuring a suite of cybersecurity software and tools for scanning and monitoring of computer network systems to identify cyber security vulnerabilities, attacks, unauthorized access or data breach, viruses, worms, spyware, adware, and malware; providing temporary use of non-downloadable software for scanning computer network environments to identify assets in the environment and define an attack surface across the network, perimeter, host, and accounts; providing temporary use of non-downloadable software for providing training to assist in prevention of cybersecurity incidents; providing temporary use of non-downloadable software for assessing and testing user training necessities and progress in the field of cybersecurity; providing temporary use of non-downloadable software for comparing a company's current security posture with industry accepted cyber security frameworks and recommendations; cybersecurity services, namely, cybersecurity operations services, namely, containment of cyber attacks and breaches after the breaches have already occurred; cybersecurity services, namely, cybersecurity operations services, namely, recovering data and restoring systems after a cyber attack to return computer networks to a pre-incident state; computer security threat analysis for protecting data; analysis and evaluation of the security policies, protocols, and network technology of others to gauge compliance with industry standards in the field of cybersecurity; providing customized data feeds featuring user-defined information in the field of cybersecurity threats to provide indicators of compromise on computer network systems and to help determine the potential objectives of computer network attacks
TRUCLICK
TRUCLICK
Service Mark
Word
REGISTERED
Owner:
Serial:98175824
Filed:Sep 12, 2023
Classes:41, 42
Registration:7788505
Registered:May 6, 2025
Goods & Services
simulation-based training services in the field of cyber security awareness; training services in the field of cybersecurity awareness; providing temporary use of on-line non-downloadable software for simulating and assessing cyber security vulnerabilities and attacks; providing temporary use of on-line non-downloadable software for collecting and analyzing user response data; providing temporary use of on-line non-downloadable software for assessing and testing user training necessities and user training progress; Software as a service (SaaS) services featuring software for simulating and assessing cyber security vulnerabilities and attacks; Software as a service (SaaS) services featuring software for collecting and analyzing user response data; Software as a service (SaaS) services featuring software for assessing and testing user training necessities and user training progress; providing temporary use of on-line non-downloadable software for cybersecurity awareness and remediation training; Providing temporary use of on-line non-downloadable software for providing internet security in the form of integrated cybersecurity awareness training, simulated attacks to assess cybersecurity vulnerabilities, and regulatory compliance training; Software as a service (SaaS) services featuring software for cybersecurity awareness and remediation training; Software as a service (SAAS) services featuring software for providing internet security in the form of integrated cybersecurity awareness training, simulated attacks to assess cybersecurity vulnerabilities, and regulatory compliance training
97873606
97873606
Service Mark
Design
REGISTERED
Owner:
Serial:97873606
Filed:Apr 5, 2023
Classes:42
Registration:7316219
Registered:Feb 27, 2024
Goods & Services
computer network technology services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the cybersecurity policies, protocols and technology of others to assure compliance with cybersecurity industry standards
ARCTIC WOLF SECURITY OPERATIONS CLOUD
REGISTERED
Owner:
Serial:97739349
Filed:Jan 3, 2023
Classes:42
Registration:7538793
Registered:Oct 15, 2024
Goods & Services
"SECURITY OPERATIONS CLOUD"
SECURITY OPERATIONS CLOUD
SECURITY OPERATIONS CLOUD
Service Mark
Combined
ABANDONED
Owner:
Serial:97739353
Filed:Jan 3, 2023
Classes:42
Goods & Services
"SECURITY OPERATIONS CLOUD"
SECURITY: THE AWARENESS
SECURITY: THE AWARENESS
Service Mark
Word
ABANDONED
Owner:
Serial:97701163
Filed:Dec 2, 2022
Classes:42
CYLANCEAVERT
CYLANCEAVERT
Trademark
Word
REGISTERED
Owner:
Serial:97485507
Filed:Jul 1, 2022
Classes:9
Registration:7317371
Registered:Feb 27, 2024
Goods & Services
Recorded and downloadable computer software for providing cyber-security, endpoint security and data protection and privacy; recorded and downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; recorded and downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; recorded and downloadable computer software that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices
CYLANCEGATEWAY
CYLANCEGATEWAY
Trademark
Word
REGISTERED
Owner:
Serial:97485501
Filed:Jul 1, 2022
Classes:9
Registration:7121629
Registered:Jul 25, 2023
Goods & Services
Recorded and downloadable computer software for providing cyber-security, endpoint security and data protection and privacy; recorded and downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; recorded and downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; recorded and downloadable computer software that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices
CYLANCEPERSONA
CYLANCEPERSONA
Trademark
Word
REGISTERED
Owner:
Serial:97485495
Filed:Jul 1, 2022
Classes:9
Registration:7121628
Registered:Jul 25, 2023
Goods & Services
Recorded and downloadable computer software for providing cyber-security, endpoint security and data protection and privacy; recorded and downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; recorded and downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; recorded and downloadable computer software that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices
CYLANCEAVERT
CYLANCEAVERT
Service Mark
Word
REGISTERED
Owner:
Serial:97470734
Filed:Jun 22, 2022
Classes:42
Registration:7121182
Registered:Jul 25, 2023
Goods & Services
Technology consultation in the field of cybersecurity; Design and development of computer software; Software as a service (SaaS) and Platform as a service (PaaS) services featuring software for providing cyber-security, data protection and privacy; Providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; Providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; computer software services, namely, development, maintenance, repair, installation, troubleshooting of problems, support in the nature of diagnosing problems, upgrade and updating, authoring, provision of information, consultation, design and customization of computer software and middleware; computer security consultancy; providing temporary use of non-downloadable software for artificial intelligence, analytics based machine learning, and non-downloadable deep learning software, all for the purpose of the design, development, installation, deployment, analysis, monitoring of and maintenance of computer software; Platform as a service (PAAS) services featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices
CYLANCEGATEWAY
CYLANCEGATEWAY
Service Mark
Word
REGISTERED
Owner:
Serial:97470754
Filed:Jun 22, 2022
Classes:42
Registration:7121185
Registered:Jul 25, 2023
Goods & Services
Technology consultation in the field of cybersecurity; Design and development of computer software; Software as a service (SaaS) and Platform as a service (PaaS) services featuring software for providing cyber-security, data protection and privacy; Providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; Providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; computer software services, namely, development, maintenance, repair, installation, troubleshooting of problems, support in the nature of diagnosing problems, upgrade and updating, authoring, provision of information, consultation, design and customization of computer software and middleware; computer security consultancy; providing temporary use of non-downloadable software for artificial intelligence, analytics based machine learning, and non-downloadable deep learning software, all for the purpose of the design, development, installation, deployment, analysis, monitoring of and maintenance of computer software; Platform as a service (PAAS) services featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices
CYLANCEPERSONA
CYLANCEPERSONA
Service Mark
Word
REGISTERED
Owner:
Serial:97470713
Filed:Jun 22, 2022
Classes:42
Registration:7121180
Registered:Jul 25, 2023
Goods & Services
Technology consultation in the field of cybersecurity; Design and development of computer software; Software as a service (SaaS) and Platform as a service (PaaS) services featuring software for providing cyber-security, data protection and privacy; Providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; Providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; computer software services, namely, development, maintenance, repair, installation, troubleshooting of problems, support in the nature of diagnosing problems, upgrade and updating, authoring, provision of information, consultation, design and customization of computer software and middleware; computer security consultancy; providing temporary use of non-downloadable software for artificial intelligence, analytics based machine learning, and non-downloadable deep learning software, all for the purpose of the design, development, installation, deployment, analysis, monitoring of and maintenance of computer software; Platform as a service (PAAS) services featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices
SECURITY OPERATIONS CLOUD
ABANDONED
Owner:
Serial:97087471
Filed:Oct 22, 2021
Classes:42
END CYBER RISK
END CYBER RISK
Service Mark
Word
REGISTERED
Owner:
Serial:90618345
Filed:Apr 1, 2021
Classes:42
Registration:6853728
Registered:Sep 20, 2022
Goods & Services
computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards
SECURITY JOURNEY
SECURITY JOURNEY
Service Mark
Word
REGISTERED
Owner:
Serial:90618330
Filed:Apr 1, 2021
Classes:42
Registration:7019810
Registered:Apr 4, 2023
Goods & Services
Class 042: computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards
ARCTIC WOLF PREDATOR PLATFORM
ABANDONED
Owner:
Serial:90259951
Filed:Oct 16, 2020
Classes:42
Goods & Services
"PLATFORM"
SYTE
SYTE
Service Mark
Word
REGISTERED
Owner:
Serial:88934859
Filed:May 27, 2020
Classes:41
Registration:6494414
Registered:Sep 21, 2021
Goods & Services
providing instruction and training regarding computer and database security audits, and compliance with computer security standards and certifications | IT security, protection and restoration, namely, assessing, detecting, and preventing IT system vulnerabilities, security risks, and threats; Computer network, computer application, and data security consultancy; Security audits of computer networks, computer applications, and databases; Development of response plans for computer network security, computer application security, and data security incidents; Vulnerability testing and threat analysis of computer networks, computer applications, and databases for unauthorized access, malicious use, and cyberattack; Detecting, analyzing, reporting on, and protecting computer networks, computer applications, and databases from unauthorized access, malicious use, malware, and cyberattack; Detecting security breaches and malicious activities on computer networks, computer applications, and databases; Monitoring, tracking, collecting, and analyzing the activities of users of computer networks, computer applications, and databases; Evaluating the performance of security measures used to protect computer networks, computer applications, and databases; Performing compliance checks in the nature testing, analysis, and evaluation of computer networks, computer applications, and databases to assure compliance with computer security standards and certifications; Management of compliance with computer security standards and certifications, namely, electronic storage, organization, and cataloguing of compliance documents, event logs, and task lists
TETRA DEFENSE
TETRA DEFENSE
Service Mark
Word
REGISTERED
Owner:
Serial:88785157
Filed:Feb 4, 2020
Classes:42, 45
Registration:6193325
Registered:Nov 10, 2020
Goods & Services
Class 042: Cyber incident response services, namely, ransomware consulting, email compromise investigation, and data breach incident consulting; cybersecurity risk management consulting services; cybersecurity risk assessment services; cybersecurity testing services; cybersecurity compliance consulting services; digital forensics services, namely, mobile device forensics, network forensics, and employee digital misconduct investigations; computer forensics investigation services, namely, the acquisition, recovery, retrieval, analysis, processing, and reporting of information stored on electronic media; Class 045: Conducting electronic discovery services related to litigation, namely, identification, preservation, collection, processing, analysis, review, and production of electronically stored information
MANAGED SECURITY AWARENESS
REGISTERED
Owner:
Serial:88675529
Filed:Oct 31, 2019
Classes:41
Registration:6087459
Registered:Jun 23, 2020
Goods & Services
Training services in the field of security awareness
ARCTIC WOLF
ARCTIC WOLF
Service Mark
Word
REGISTERED
Owner:
Serial:88509812
Filed:Jul 11, 2019
Classes:42
Registration:5972362
Registered:Jan 28, 2020
Goods & Services
Computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards
CONCIERGE SECURITY
CONCIERGE SECURITY
Service Mark
Word
REGISTERED
Owner:
Serial:88509817
Filed:Jul 11, 2019
Classes:42
Registration:6022511
Registered:Mar 31, 2020
Goods & Services
"SECURITY"; IT consulting services; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; security operations services in the nature of computer services, namely, detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; monitoring of computer systems for detecting unauthorized access or data breach; technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity and IT threats; technology supervision and inspection in the field of cybersecurity and IT threats; computer services, namely, monitoring, testing, analyzing, and reporting on computer security incidents and detection, containment, and remediation of IT threats; computer security threat analysis for protecting data; testing, analysis, and evaluation of the security policies, protocols and technology of others to assure compliance with cybersecurity industry standards
CYLANCEGUARD
CYLANCEGUARD
Service Mark
Word
REGISTERED
Owner:
Serial:88248032
Filed:Jan 3, 2019
Classes:42
Registration:6038132
Registered:Apr 21, 2020
Goods & Services
providing online non-downloadable software for use in preventing unauthorized access to computer and electronics systems; providing online non-downloadable internet security software; consulting services in the field of downloadable and non-downloadable Internet security software; consulting services in the fields of the design, development, and implementation of computer hardware and software for preventing unauthorized access to computers and electronics systems; consulting services in the field of internet security software
CYLANCEHYBRID
CYLANCEHYBRID
Trademark
Word
CANCELLED
Owner:
Serial:88017088
Filed:Jun 27, 2018
Classes:9, 42
Registration:5836041
Registered:Aug 13, 2019
Goods & Services
Internet security software; software for preventing unauthorized access to computers and electronics systems; software for facilitating communications between a cloud and a local computing infrastructure; providing online non-downloadable Internet security software; providing online non-downloadable software for preventing unauthorized access to computers and electronics systems; providing online non-downloadable software for facilitating communications between a cloud and a local computing infrastructure
CYLANCEON-PREM
CYLANCEON-PREM
Trademark
Word
CANCELLED
Owner:
Serial:88017100
Filed:Jun 27, 2018
Classes:9, 42
Registration:5836042
Registered:Aug 13, 2019
Goods & Services
Internet security software; software for preventing unauthorized access to computers and electronics systems; software for updating and managing software agents on endpoints; providing online non-downloadable Internet security software; providing online non-downloadable software for preventing unauthorized access to computers and electronics systems; providing online non-downloadable software for updating and managing software agents on endpoints
88000796
88000796
Trademark
Design
REGISTERED
Owner:
Serial:88000796
Filed:Jun 14, 2018
Classes:9
Registration:5997794
Registered:Feb 25, 2020
Goods & Services
downloadable software accessible via a web interface for preventing unauthorized access to computers and electronics systems; downloadable internet security software
88000779
88000779
Service Mark
Design
CANCELLED
Owner:
Serial:88000779
Filed:Jun 14, 2018
Classes:42
Registration:5835989
Registered:Aug 13, 2019
Goods & Services
consulting services in the field of downloadable and non-downloadable Internet security software; consulting services in the fields of the design, development, and implementation of computer hardware and software for preventing unauthorized access to computers and electronics systems; consulting services in the field of internet security software
CYLANCE SMART ANTIVIRUS
CYLANCE SMART ANTIVIRUS
Trademark
Combined
REGISTERED
Owner:
Serial:87954326
Filed:Jun 8, 2018
Classes:9
Registration:5997742
Registered:Feb 25, 2020
Goods & Services
Downloadable software accessible via a web interface for preventing unauthorized access to computers and electronics systems; downloadable internet security software; "SMART ANTIVIRUS"
CYLANCE SMART ANTIVIRUS
REGISTERED
Owner:
Serial:87952809
Filed:Jun 7, 2018
Classes:9
Registration:5997739
Registered:Feb 25, 2020
Goods & Services
Downloadable software accessible via a web interface for preventing unauthorized access to computers and electronics systems; downloadable internet security software; "SMART ANTIVIRUS"
ROOTSECURE
ROOTSECURE
Service Mark
Word
CANCELLED
Owner:
Serial:87735296
Filed:Dec 27, 2017
Classes:42
Registration:5589122
Registered:Oct 23, 2018
Goods & Services
Software as a service (SAAS) services featuring software used to assess and manage the cyber risk and vulnerability of a computer technology network; computer network technology security services, namely, monitoring technological functions of computer network systems for vulnerabilities, and restricting access by computer networks to undesired web sites, media and individuals and facilities; computer network technology security consulting services
CYLANCEOPTICS
CYLANCEOPTICS
Trademark
Word
REGISTERED
Owner:
Serial:87469882
Filed:May 31, 2017
Classes:9, 42
Registration:5571576
Registered:Sep 25, 2018
Goods & Services
Endpoint detection and response software; Providing online non-downloadable endpoint detection and response software
X
X
Trademark
Combined
REGISTERED
Owner:
Serial:87201455
Filed:Oct 12, 2016
Classes:9, 42
Registration:5171653
Registered:Mar 28, 2017
Goods & Services
Downloadable software for use in preventing unauthorized access to computer and electronics systems that is accessible via a web interface; downloadable internet security software; Providing online non-downloadable internet security software; providing online non-downloadable computer software for use in preventing unauthorized access to computer and electronics systems
THREATZERO
THREATZERO
Service Mark
Word
REGISTERED
Owner:
Serial:86759649
Filed:Sep 17, 2015
Classes:42
Registration:5346764
Registered:Nov 28, 2017
Goods & Services
providing non-downloadable software for use in preventing unauthorized access to computer and electronics systems; providing non-downloadable internet security software; consulting services in the field of downloadable and non-downloadable Internet security software; consulting services in the fields of the design, development, and implementation of computer hardware and software for preventing unauthorized access to computers and electronics systems; consulting services in the field of internet security software
CYLANCE
CYLANCE
Trademark
Stylized
REGISTERED
Owner:
Serial:86655881
Filed:Jun 9, 2015
Classes:9, 42
Registration:5125156
Registered:Jan 17, 2017
Goods & Services
Downloadable software for use in preventing unauthorized access to computers and electronics systems that is accessible via a web interface; downloadable Internet security software; Providing online non-downloadable Internet security software; consulting services for others in connection with computer forensics; consulting services for others in connection with Internet security hardware and software; computer security consulting services for others in connection with preventing unauthorized access to computers and electronics systems
X
X
Trademark
Combined
REGISTERED
Owner:
Serial:86655878
Filed:Jun 9, 2015
Classes:9, 42
Registration:5169214
Registered:Mar 28, 2017
Goods & Services
Downloadable software for use in preventing unauthorized access to computer and electronics systems that is accessible via a web interface; downloadable internet security software; Providing online non-downloadable internet security software; providing online non-downloadable computer software for use in preventing unauthorized access to computer and electronics systems
86642506
86642506
Trademark
Design
REGISTERED
Owner:
Serial:86642506
Filed:May 27, 2015
Classes:9
Registration:4870795
Registered:Dec 15, 2015
Goods & Services
Downloadable software for for use in preventing unauthorized access to computer and electronics systems that is accessible via a web interface; downloadable internet security software
ID360
ID360
Service Mark
Word
CANCELLED
Owner:
Serial:86376916
Filed:Aug 26, 2014
Classes:42
Registration:4716024
Registered:Apr 7, 2015
THE HUMAN SIDE OF SECURITY
CANCELLED
Owner:
Serial:86324145
Filed:Jun 30, 2014
Classes:45
Registration:4681833
Registered:Feb 3, 2015
Goods & Services
Consultation in the field of data theft and identity theft; Fraud and identity theft protection services; Security consultancy; Security threat analysis for personal protection purposes; Security threat analysis for protecting personal property
CYLANCEPROTECT
CYLANCEPROTECT
Trademark
Word
REGISTERED
Owner:
Serial:86193569
Filed:Feb 14, 2014
Classes:9
Registration:4730095
Registered:May 5, 2015
Goods & Services
downloadable software accessible via a web interface for preventing unauthorized access to computers and electronics systems
INFINITY
INFINITY
Service Mark
Word
REGISTERED
Owner:
Serial:86173889
Filed:Jan 23, 2014
Classes:42
Registration:4551950
Registered:Jun 17, 2014
Goods & Services
Providing online non-downloadable Internet security software; Providing online non-downloadable software for preventing unauthorized access to computers and electronics systems
CYLANCEV
CYLANCEV
Trademark
Word
REGISTERED
Owner:
Serial:86019673
Filed:Jul 25, 2013
Classes:9, 42
Registration:4700636
Registered:Mar 10, 2015
Goods & Services
Downloadable Internet security software; Downloadable software for preventing unauthorized access to computers and electronics systems; Computer downloadable software for predicting and preventing computer and electronics security issues prior to their occurring; Providing online non-downloadable Internet security software; Providing online non-downloadable software for preventing unauthorized access to computers and electronics systems; Providing a website featuring temporary use of non-downloadable Internet security software; Providing a website featuring temporary use of non-downloadable software for preventing access to computers and electronics systems; Providing a website featuring temporary use of non-downloadable software for use in predicting and preventing computer and electronics security issues prior to their occurring
CYLANCE
CYLANCE
Trademark
Word
REGISTERED
Owner:
Serial:85636405
Filed:May 27, 2012
Classes:9, 42
Registration:4589223
Registered:Aug 19, 2014
Goods & Services
Downloadable Internet security software; Downloadable software for preventing unauthorized access to computers and electronics systems; Providing online non-downloadable Internet security software; Providing online non-downloadable software for preventing unauthorized access to computers and electronics systems; Consulting services in the field of downloadable and non-downloadable Internet security software; Consulting services in the fields of the design, development, and implementation of computer hardware and software for preventing unauthorized access to computers and electronics systems