COGNYTE TECHNOLOGIES ISRAEL LTD. logo

COGNYTE TECHNOLOGIES ISRAEL LTD.

8 Marks
Other
First Filed:Oct 12, 2004Latest Filed:Jan 15, 2025Address:33 Maskit St., Herzliya, 4673333, IL

Portfolio Overview

Registered
2(25%)
Pending
3(38%)
Dead
3(38%)
Previous
1

Top Classes

Class 9
Electronics, Software & Scientific Equipment
6(75%)
Class 42
Software, IT Services & Scientific Research
3(38%)

TTAB Proceedings

Total Proceedings
2
As Plaintiff
0(0%)
As Defendant
2(100%)

Top Firms

MINTZ, LEVIN, COHN, FERRIS, ...(Jan 2025)
7
Shift Law Professional Corpo...(Oct 2020)
1

Trademark Portfolio

9 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
COGNYTE ACTIONABLE INTELLIGENCE FOR A SAFER WORLD
Owner:
Serial:98963500
Filed:Jan 15, 2025
Classes:42
Goods & Services
Computer and software security consulting services in the nature of investigative analytics operational intelligence analytic and threat intelligence analytics provided to governmental entities and business organizations in the fields of cyber security, network intelligence, web and social intelligence, unifying and analyzing intelligence data, surveillance of computer, telecommunication and digital networks to help such entities and organizations neutralize and prevent terror, crime and cyber threats; Cybersecurity services in the nature of protecting data and information from unauthorized access, and restricting access to computer systems; Data security consultancy; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Providing temporary use of online non-downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, unifying and analyzing intelligence data, surveillance of computer and telecommunication networks; All of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities.
FALCONET
FALCONET
Trademark
Word
PENDING
Owner:
Serial:98014006
Filed:May 25, 2023
Classes:9
Goods & Services
Cellular, wireless, and mobility communication monitoring and management apparatus and instruments comprised of downloadable computer software and computer hardware for the purpose of identifying, controlling, detecting and locating wireless phones and handheld devices and targets using infrared mapping, extraction, intercepting and homing capabilities
NEXYTE
NEXYTE
Trademark
Word
REGISTERED
Owner:
Serial:98013998
Filed:May 25, 2023
Classes:9
Registration:7505463
Registered:Sep 17, 2024
Goods & Services
Computer hardware and downloadable computer software for data integration and data fusion for use in the fields of decision intelligence, digital investigations and fraud detection; Computer hardware and downloadable computer software for use in the collection, retention, storage, analysis, dissemination and distribution of networked, mobile and wireless video, audio and data transmissions | Software as a service (SAAS) services featuring software for data integration and data fusion for use in the fields of decision intelligence, digital investigations and fraud detection; Software as a service (SAAS) services featuring software for use in the collection, retention, storage, analysis, dissemination and distribution of networked, mobile and wireless video, audio and data transmissions
MOBILE-WASP
MOBILE-WASP
Trademark
Word
ABANDONED
Owner:
Serial:97456957
Filed:Jun 14, 2022
Classes:9
COGNYTE
COGNYTE
Trademark
Stylized
ITU
PENDING
Owner:
Serial:90211325
Filed:Sep 25, 2020
Classes:42
Goods & Services
Downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, and surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities; Computer and software security consulting services in the nature of investigative analytics operational intelligence analytic and threat intelligence analytics provided to governmental entities and business organizations in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer, telecommunication and digital networks to help such entities and organizations neutralize and prevent terror, crime and cyber threats; Cybersecurity services in the nature of protecting data and information from unauthorized access, and restricting access to computer systems; Data security consultancy; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Providing temporary use of online non-downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities
COGNYTE
COGNYTE
Trademark
Word
REGISTERED
Owner:
Serial:90118525
Filed:Aug 17, 2020
Classes:9
Registration:7490927
Registered:Sep 3, 2024
Goods & Services
Downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, and surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities | Computer and software security consulting services in the nature of investigative analytics operational intelligence analytic and threat intelligence analytics provided to governmental entities and business organizations in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer, telecommunication and digital networks to help such entities and organizations neutralize and prevent terror, crime and cyber threats; Cybersecurity services in the nature of protecting data and information from unauthorized access, and restricting access to computer systems; Data security consultancy; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Providing temporary use of online non-downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities
COGNYTE SOFTWARE
COGNYTE SOFTWARE
Trademark
Word
ABANDONED
Owner:
Serial:90118552
Filed:Aug 17, 2020
Classes:9
Goods & Services
"SOFTWARE"
NEXTIVA
NEXTIVA
Trademark
Word
CANCELLED
Owner:
Serial:78498326
Filed:Oct 12, 2004
Classes:9, 42
Registration:3262089
Registered:Jul 10, 2007
Goods & Services
Class 009: computer hardware and software for use in the fields of digital security, surveillance, and enterprise business intelligence for use in the collection, retention, storage, analysis, dissemination and distribution of networked, mobile and wireless video, audio and data transmissions, and instruction manuals and documentation, sold as a unit; Class 042: computer consulting services in the fields of digital security, surveillance and enterprise business intelligence
SYMPHIA
SYMPHIA
Trademark
Word
Previous
REGISTERED
Owner:
Serial:90281076
Filed:Oct 27, 2020
Classes:9
Registration:7451169
Registered:Jul 16, 2024
Goods & Services
Downloadable computer programs and downloadable computer software all for use with connecting, controlling, analyzing and managing security devices, security sensors and data for rapid security response for governmental entities and business organizations | Computer software consulting and consulting services in the field of hosting software applications all for connecting, controlling, analyzing and managing security devices, security sensors and data for rapid security response for governmental entities and business organizations

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.