Atlas Cyber, Inc. logo

Atlas Cyber, Inc.

2 Marks
Corp.
First Filed:Dec 4, 2025Latest Filed:Dec 4, 2025Address:251 Little Falls Drive, Wilmington, DE 19808-1674

Portfolio Overview

Pending
2(100%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
2(100%)
Class 42
Software, IT Services & Scientific Research
2(100%)

TTAB Proceedings

No litigation activity

Top Firms

Law Office of Ilya Libenzon(Dec 2025)
2

Trademark Portfolio

2 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
NEWCORE
NEWCORE
Trademark
Word
PENDING
Owner:
Serial:99529258
Filed:Dec 4, 2025
Classes:9, 42
Goods & Services
Class 009: Downloadable computer software for cybersecurity, identity management, access management, monitoring and detecting cybersecurity threats, preventing unauthorized access, authentication and authorization, identity verification, managing user permissions and security policies, implementing zero-trust security models, secure data access, credential management, and identity governance; Class 042: Providing temporary use of online non-downloadable computer software for cybersecurity, identity management, access management, monitoring and detecting cybersecurity threats, preventing unauthorized access, authentication and authorization, identity verification, managing user permissions and security policies, implementing zero-trust security models, secure data access, credential management, and identity governance
NEWCORE IDENTITY
NEWCORE IDENTITY
Trademark
Word
PENDING
Owner:
Serial:99529283
Filed:Dec 4, 2025
Classes:9, 42
Goods & Services
Class 009: Downloadable computer software for cybersecurity, identity management, access management, monitoring and detecting cybersecurity threats, preventing unauthorized access, authentication and authorization, identity verification, managing user permissions and security policies, implementing zero-trust security models, secure data access, credential management, and identity governance; Class 042: Providing temporary use of online non-downloadable computer software for cybersecurity, identity management, access management, monitoring and detecting cybersecurity threats, preventing unauthorized access, authentication and authorization, identity verification, managing user permissions and security policies, implementing zero-trust security models, secure data access, credential management, and identity governance

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.