CROWDSTRIKE, INC. logo

CROWDSTRIKE, INC.

42 Marks
Corp.
First Filed:Jan 5, 2012Latest Filed:Nov 5, 2025Address:150 Mathilda Place, Sunnyvale, CA 94086, US

Portfolio Overview

Registered
31(74%)
Pending
4(10%)
Dead
7(17%)

Top Classes

Class 42
Software, IT Services & Scientific Research
30(71%)
Class 9
Electronics, Software & Scientific Equipment
16(38%)
Class 45
Personal services
9(21%)

TTAB Proceedings

Total Proceedings
17
As Plaintiff
14(82%)
As Defendant
3(18%)

Top Firms

Erise IP, P.A.(Nov 2025)
38
WILSON SONSINI GOODRICH & RO...(Apr 2015)
3
Morgan, Lewis & Bockius LLP(Aug 2012)
1

Trademark Activity Timeline(2012 – 2025)

Trademark Portfolio

42 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
FALCON SHIELD
FALCON SHIELD
Service Mark
Word
PENDING
Owner:
Serial:99479852
Filed:Nov 5, 2025
Classes:42
Goods & Services
Class 042: Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
CROWDSTRIKE FINANCIAL SERVICES
PENDING
Owner:
Serial:99432848
Filed:Oct 8, 2025
Classes:36
Goods & Services
Class 036: Financial services, namely, providing financing for purchasing cybersecurity software and services; financial services, namely, providing loans, lines of credit, and lease-purchase financing for cybersecurity technologies; financial management and consulting services related to budgeting, payment planning, and cash flow optimization for the acquisition of cybersecurity software and services; providing information and advisory services in the field of financing cybersecurity purchasing; financial transaction services, namely, providing secure commercial transactions and payment options for cybersecurity products and services
FALCON FLEX
FALCON FLEX
Service Mark
Word
PENDING
Owner:
Serial:99432842
Filed:Oct 8, 2025
Classes:42, 45
Goods & Services
Class 042: Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates; Class 045: licensing of software, namely, computer and network security software
FALCON ADVERSARY OVERWATCH
REGISTERED
Owner:
Serial:98697995
Filed:Aug 14, 2024
Classes:42
Registration:7815160
Registered:Jun 3, 2025
Goods & Services
"ADVERSARY"; Computer security consulting; consulting in the field of information technology; consultation in the field of computer and network security for protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for use in computer and network security; computer services, namely, cloud computing services in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy in the field of endpoint protection software and curated cyberthreat data for protecting data and information from unauthorized access computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates; computer security threat analysis services, namely, advanced computer threat detection services, using real-time monitoring and machine learning to detect computer threats and viruses, and providing detailed analysis and contextual intelligence to inform responses to sophisticated computer threats; computer security services, namely, monitoring and investigation of bad actors and adversaries across computer networks to neutralize emerging computer threats and improve cybersecurity and computer network security
CHARLOTTE AI
CHARLOTTE AI
Service Mark
Word
PENDING
Owner:
Serial:98303107
Filed:Dec 7, 2023
Classes:42
Goods & Services
AI; Software as a service (SaaS) services featuring software for automating customer interactions and data collection for computer security consulting, namely, using artificial intelligence for customer interaction for identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; software as a service (SaaS) services featuring software using artificial intelligence for automating customer interactions and data collection for scanning and penetration testing of computers and networks to assess information security vulnerability for maintaining and updating of computer software relating to computer and network security and prevention of computer risks, and for protecting data and information from unauthorized access using artificial intelligence to develop plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches associated with authorizing access to databases in the field of computer and network security; cloud computing services using artificial intelligence for automating customer interactions and data collection in the field of computer and network security; software as a service (SaaS) services featuring software using artificial intelligence for automating customer interactions and data collection for conducting online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; software as a service (SaaS) services featuring software using artificial intelligence for automating customer interactions and data collection for monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems using software as a service (SaaS) services using artificial intelligence for automating customer interactions for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for detecting breaches associated with authorizing access to databases in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security using artificial intelligence for automating customer interactions and collection of data; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates; providing online non-downloadable software for the artificial production of human speech and text based on deep learning algorithms to recognize and respond to customer interactions relating to computer security consulting, namely, for identifying malware on computer systems, identifying the source and genealogy of malware, identifying the objectives of computer system attackers, scanning and penetration testing of computers and networks to assess information security vulnerability, maintaining and updating of computer software relating to computer and network security and prevention of computer risks, and for protecting data and information from unauthorized access using artificial intelligence to develop plans for improving computer and network security and preventing criminal activity.
FALCON PREVENT
FALCON PREVENT
Service Mark
Word
REGISTERED
Owner:
Serial:98256290
Filed:Nov 6, 2023
Classes:42
Registration:7584715
Registered:Dec 3, 2024
Goods & Services
"PREVENT"; Computer security consulting; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
WE STOP BREACHES
WE STOP BREACHES
Service Mark
Word
REGISTERED
Owner:
Serial:97772666
Filed:Jan 30, 2023
Classes:35, 42
Registration:7547374
Registered:Oct 29, 2024
Goods & Services
Business administration services; Business services, namely, administration of a program for enabling participants to receive expedited investigative and remediation services in the field of data security, computer security and network security | Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
PROTECTION THAT POWERS YOU
REGISTERED
Owner:
Serial:97770795
Filed:Jan 27, 2023
Classes:35, 42
Registration:7207651
Registered:Oct 31, 2023
Goods & Services
Business administration services; business services, namely, administration of a program for enabling participants to receive expedited investigative and remediation services in the field of data security, computer security and network security | Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breeches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
FALCON SURFACE
FALCON SURFACE
Service Mark
Word
REGISTERED
Owner:
Serial:97764884
Filed:Jan 23, 2023
Classes:42
Registration:7343530
Registered:Apr 2, 2024
Goods & Services
"SURFACE"; Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
CROWDSTRIKE ASSET GRAPH
CROWDSTRIKE ASSET GRAPH
Service Mark
Word
REGISTERED
Owner:
Serial:97753815
Filed:Jan 13, 2023
Classes:42
Registration:7498455
Registered:Sep 10, 2024
Goods & Services
"ASSET GRAPH"
FALCON LOGSCALE
FALCON LOGSCALE
Service Mark
Word
REGISTERED
Owner:
Serial:97753788
Filed:Jan 13, 2023
Classes:35, 42
Registration:7683677
Registered:Feb 11, 2025
Goods & Services
Business analysis, research and information services; business consulting services in the field of information technology (IT) and cloud computing; compilation and systemization of information into computer databases; database management services; business data analysis; data processing services; conducting and arranging trade show exhibitions for commercial and advertising purposes in the fields of technology, cloud computing, web services, software, software as a service (SaaS), artificial intelligence, software development, game development, databases, data processing and analytics, data storage, data warehousing, data archiving, data and information security, networking, mobile computing, and the Internet of Things (IoT); Design and development of computer hardware and software; cloud computing services, namely, consulting services in the field of cloud computing; computer services, namely, cloud hosting provider services; hosting of digital content on the Internet; computer services, namely, cloud hosting of electronic databases and virtual computing environments; database development services, namely, administering and maintaining databases and virtual computing environments for others in the nature of providing virtual computer systems and virtual computer environment through cloud computing and maintenance of online databases therein; electronic data storage; rental of web servers and co-location servers for containerized data centers of others; Application service provider (ASP), namely, hosting computer software applications and databases of others; computer services, namely, application service provider in the nature of hosting, managing, administering, maintaining, monitoring to improve scalability and performance, data encrypting, data decrypting, data replicating and backing up databases and cloud computing environments for others; data and application migration services; data mining services; electronic data backup and data restoration services in the nature of recovery of computer data; remote online backup of computer data; data encryption and decryption services; data warehousing; technical support services, namely, troubleshooting of computer software problems; software as a service (SaaS) services featuring software for collecting, editing, modifying, organizing, synchronizing, integrating, monitoring, transmitting, storage and sharing of data and information
97566160
97566160
Service Mark
Design
REGISTERED
Owner:
Serial:97566160
Filed:Aug 26, 2022
Classes:42
Registration:7403088
Registered:May 28, 2024
Goods & Services
Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
CROWDSTRIKE
CROWDSTRIKE
Service Mark
Combined
REGISTERED
Owner:
Serial:97468299
Filed:Jun 21, 2022
Classes:42
Registration:7173221
Registered:Sep 26, 2023
Goods & Services
Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
WELCOME TO ANYWHERE
WELCOME TO ANYWHERE
Service Mark
Word
REGISTERED
Owner:
Serial:90580142
Filed:Mar 15, 2021
Classes:42
Registration:6817517
Registered:Aug 16, 2022
Goods & Services
Computer security consulting; consulting in the field of information technology; consultation for protecting data and information from unauthorized access in the field of computer and network security, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; software as a service (SAAS) services featuring software for computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; computer security consultancy in the field of administration of digital keys and digital certificates; Monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware and networks, and software
ADVERSARY UNIVERSE
ADVERSARY UNIVERSE
Service Mark
Word
REGISTERED
Owner:
Serial:90550805
Filed:Feb 27, 2021
Classes:41
Registration:6763871
Registered:Jun 21, 2022
Goods & Services
Class 041: Providing online education in the nature of online courses in the fields of cybersecurity, endpoint protection and response technology, cyber threat intelligence, and the detection and prevention of security breaches; providing online non-downloadable journals in the form of articles and commentary on cybersecurity, endpoint protection and response technology, cyber threat intelligence, and the detection and prevention of security breaches; entertainment services, namely, providing online, non-downloadable comic books and short stories in the field of cyber threat intelligence
ECRIME INDEX
ECRIME INDEX
Service Mark
Word
REGISTERED
Owner:
Serial:90550807
Filed:Feb 27, 2021
Classes:42
Registration:6965834
Registered:Jan 24, 2023
Goods & Services
Providing information in the field of monetization of cybersecurity breaches for the protection of data and information from unauthorized access
CROWDEXCHANGE
CROWDEXCHANGE
Service Mark
Word
REGISTERED
Owner:
Serial:90324452
Filed:Nov 17, 2020
Classes:35, 38, 42
Registration:6427821
Registered:Jul 20, 2021
Goods & Services
Providing a website featuring recommendations, ratings and reviews posted by consumers about local service providers in the field of computer security for commercial purposes; conducting consumer opinion surveys; collecting market research, namely, consumer testimonials, and reviews; market research, namely, conducting consumer interviews; market research, namely, collecting consumer video clips and sound bites; providing customer loyalty services, namely, offering consumers promotional items, prizes, and merit points in exchange for completing online challenges and sharing consumer opinions of wares and services; collecting and analyzing market data concerning consumers' online communications concerning wares and services; market research, namely, collecting, analyzing, and sharing data concerning consumers' online communications concerning wares and services | Providing online forum for consumer and product announcements, consumer success stories and tips, consumer referrals, and consumer member direct messaging; providing online forum for customers to share their opinions and advice regarding the owner's wares and services with other customers through discussion boards, social networking, and online forums | Providing technical advice in the field of computer security for protecting data from unauthorized access
CROWDSTRIKE
CROWDSTRIKE
Service Mark
Combined
REGISTERED
Owner:
Serial:90188699
Filed:Sep 17, 2020
Classes:41, 42
Registration:6415232
Registered:Jul 13, 2021
Goods & Services
educational services, namely, providing online and onsite courses in the fields of cybersecurity, endpoint protection and response technology, cyber threat intelligence, and the detection and prevention of security breaches; computer security consulting; consulting in the field of information technology; consultation for protecting data and information from unauthorized access in the field of computer and network security, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints
CROWDSTRIKE
CROWDSTRIKE
Service Mark
Combined
REGISTERED
Owner:
Serial:90188694
Filed:Sep 17, 2020
Classes:42
Registration:6907733
Registered:Nov 22, 2022
Goods & Services
Software as a service (SAAS) services featuring software for computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
WE STOP. SO YOU CAN GO.
ABANDONED
Owner:
Serial:90188685
Filed:Sep 17, 2020
Classes:9, 42
Goods & Services
Class 009: downloadable computer software for the protection and security of computer networks and computing endpoints, namely, computer servers, desktop computers, smartphones and mobile computing devices; Class 042: consultation in the field of identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software for network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware; computer systems analysis; computer technology consultancy for protecting data and information from unauthorized access, namely, systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy in the field of administration of digital keys and digital certificates
WE STOP. SO YOU CAN GO.
WE STOP. SO YOU CAN GO.
Service Mark
Word
REGISTERED
Owner:
Serial:90189303
Filed:Sep 17, 2020
Classes:42
Registration:6415235
Registered:Jul 13, 2021
Goods & Services
computer security consulting; consulting in the field of information technology; consultation in the field of computer and network security; software as a service (SAAS) services featuring software for computer security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, online scanning and detecting unauthorized data and programs on computers, networks, and electronic devices; monitoring of computer systems for security purposes for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software and curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints
90132814
90132814
Trademark
Design
REGISTERED
Owner:
Serial:90132814
Filed:Aug 24, 2020
Classes:9, 42
Registration:6541052
Registered:Oct 26, 2021
Goods & Services
DOWNLOADABLE COMPUTER SOFTWARE FOR SECURE DATA ACCESS, namely, SOFTWARE PROVIDING A TRANSPARENT LAYER BETWEEN READ AND WRITE PROCESSES OF APPLICATIONS AND THE APPLICATION STORAGE SYSTEMS, SOFTWARE MANAGING DATA ACCESS CONTROL POLICIES, AND SOFTWARE PROVIDING PERSISTENT, DATA-CENTRIC CONTROL POLICIES
79290649
79290649
Trademark
Design
REGISTERED
Owner:
Serial:79290649
Filed:Mar 10, 2020
Classes:9, 35, 38, +2
Registration:6382930
Registered:Jun 15, 2021
Goods & Services
Downloadable and recorded computer search engine software; downloadable and recorded computer software for searching databases; downloadable and recorded computer software for creating searchable databases of information and data; business intelligence software, namely, downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; downloadable and recorded computer software that provides real-time, integrated business management intelligence by combining information from various databases; downloadable and recorded business analytics software for collecting and analyzing data to facilitate business decision making; downloadable and recorded computer software for use in big data analysis; downloadable and recorded computer software that automates the processing of un-structured, semi-structured and structured information and data stored on computer networks and the Internet; downloadable and recorded computer software for cloud computing, namely, for collecting, editing, modifying, organizing, synchronizing, integrating, monitoring, transmitting, storage and sharing of data and information; downloadable and recorded computer software for collecting, editing, modifying, organizing, synchronizing, integrating, monitoring, transmitting, storage and sharing of data and information; downloadable and recorded computer software for data, desktop digital media and application audiovisual material streaming; downloadable and recorded computer software for data backup, recovery and archiving; downloadable and recorded computer software for data transfer and migration; downloadable and recorded computer software for data protection and data security; downloadable and recorded computer software to automate data warehousing; downloadable and recorded database management software; downloadable and recorded computer software for creating, configuring, provisioning and scaling databases; downloadable and recorded computer software for storing, retrieving, caching, extracting, formatting, structuring, systematizing, organizing, indexing, processing, querying, analyzing, replicating and controlling access to data; downloadable and recorded computer software development tools; downloadable software development kits (SDK)
MAGYC
MAGYC
Trademark
Word
REGISTERED
Owner:
Serial:88822367
Filed:Mar 5, 2020
Classes:9, 42
Registration:6258238
Registered:Jan 26, 2021
Goods & Services
Downloadable computer software for secure data access, namely, software providing a transparent layer between read and write processes of applications and the application storage systems, software managing data access control policies, and software providing persistent, data-centric control policies | Software as a service (SAAS) services featuring software for secure data access, managing data access control policies, and providing transparent read and write access to secure storage systems
HUMIO
HUMIO
Trademark
Word
REGISTERED
Owner:
Serial:79294241
Filed:Feb 7, 2020
Classes:9, 35, 38, +2
Registration:6668963
Registered:Mar 15, 2022
Goods & Services
Downloadable and recorded computer search engine software; downloadable and recorded computer software for searching databases; downloadable and recorded computer software for creating searchable databases of information and data; business intelligence software, namely, downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; downloadable and recorded computer software that provides real-time, integrated business management intelligence by combining information from various databases; downloadable and recorded business analytics software for collecting and analyzing data to facilitate business decision making; downloadable and recorded computer software for use in big data analysis; downloadable and recorded computer software that automates the processing of un-structured, semi-structured and structured information and data stored on computer networks and the Internet; downloadable and recorded computer software for cloud computing, namely, for collecting, editing, modifying, organizing, synchronizing, integrating, monitoring, transmitting, storage and sharing of data and information; downloadable and recorded computer software for collecting, editing, modifying, organizing, synchronizing, integrating, monitoring, transmitting, storage and sharing of data and information; downloadable and recorded computer software for data, desktop digital media and application audiovisual material streaming; downloadable and recorded computer software for data backup, recovery and archiving; downloadable and recorded computer software for data transfer and migration; downloadable and recorded computer software for data protection and data security; downloadable and recorded computer software to automate data warehousing; downloadable and recorded database management software; downloadable and recorded computer software for creating, configuring, provisioning and scaling databases; downloadable and recorded computer software for storing, retrieving, caching, extracting, formatting, structuring, systematizing, organizing, indexing, processing, querying, analyzing, replicating and controlling access to data; downloadable and recorded computer software development tools; downloadable and recorded software development kits (SDK) | Advertising, marketing and promotional services; business analysis, research and information services; business consulting; business consulting services in the field of information technology (IT) and cloud computing; compilation and systemization of information into computer databases; database management services; business data analysis; data processing services; conducting and arranging trade show exhibitions for commercial and advertising purposes in the fields of technology, cloud computing, web services, software, software as a service (SaaS), artificial intelligence, software development, game development, databases, data processing and analytics, data storage, data warehousing, data archiving, data and information security, networking, mobile computing, and the Internet of Things (IoT) | Electronic data transmission; providing access to telecommunication networks; providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; providing user access to computer software in data networks; providing internet access to remotely hosted operating systems and computer applications through the Internet; providing internet access to cloud based computing resources and storage; providing access to databases; providing on-line forums for transmission of messages among computer users | Educational services, namely, conducting seminars, classes, workshops and conferences in the fields of technology, cloud computing, web services, software, software as a service (SaaS), artificial intelligence, software development, game development, databases, data processing and analytics, data storage, data warehousing, data archiving, data and information security, networking, and the Internet of Things (IoT); publication of online journals, namely, blogs featuring information in the fields of technology, cloud computing, web services, software, software as a service (SaaS), artificial intelligence, software development, databases, data processing and analytics, data storage, data warehousing, data archiving, data and information security, networking, and the Internet of Things (IoT) | Design and development of computer hardware and software; cloud computing services, namely, consulting services in the field of cloud computing; computer services, namely, cloud hosting provider services; hosting of digital content on the Internet; computer services, namely, cloud hosting provider services, namely, cloud hosting of electronic databases and virtual computing environments; database development services, namely, administering and maintaining databases and virtual computing environments for others in the nature of providing virtual computer systems and virtual computer environment through cloud computing and maintenance of online databases therein; electronic data storage; rental of web servers and co-location servers for containerized data centers of others; Application service provider (ASP), namely, hosting computer software applications and databases of others; computer services, namely, application service provider in the nature of hosting, managing, administering, maintaining, monitoring to improve scalability and performance, data encrypting, data decrypting, data replicating and backing up databases and cloud computing environments for others; data and application migration services; data mining services; electronic data backup and data restoration services in the nature of recovery of computer data; remote online backup of computer data; data encryption and decryption services; data warehousing; technical support services, namely, troubleshooting of computer software problems; software as a service (SaaS) services featuring software for collecting, editing, modifying, organizing, synchronizing, integrating, monitoring, transmitting, storage and sharing of data and information
CROWDSCORE
CROWDSCORE
Service Mark
Word
REGISTERED
Owner:
Serial:87830990
Filed:Mar 12, 2018
Classes:42, 45
Registration:6493627
Registered:Sep 21, 2021
Goods & Services
computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers | monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software
SECURECIRCLE
SECURECIRCLE
Trademark
Word
CANCELLED
Owner:
Serial:87577763
Filed:Aug 21, 2017
Classes:9
Registration:5515379
Registered:Jul 10, 2018
Goods & Services
Computer software for encryption
P PREEMPT
P PREEMPT
Trademark
Combined
REGISTERED
Owner:
Serial:87041529
Filed:May 18, 2016
Classes:9
Registration:6130534
Registered:Aug 18, 2020
Goods & Services
Downloadable software for cloud and network security; Computer software for computer network security; Software for detecting, identifying, tracking, blocking, removing, analyzing, reporting and managing computer security threats and malware; Software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; Software for providing security for email, internet and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; Software for secure storage and management of usernames and passwords; Software for computer and network security policy administration and enforcement
FALCON OVERWATCH
FALCON OVERWATCH
Service Mark
Word
REGISTERED
Owner:
Serial:86913839
Filed:Feb 19, 2016
Classes:42, 45
Registration:7019125
Registered:Apr 4, 2023
Goods & Services
monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans for improving computer and network security for businesses and governmental agencies, namely, computer security assurance and administration of digital keys and digital certificates via a global computer network; computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers
ATI CLOUD
ATI CLOUD
Trademark
Word
ABANDONED
Owner:
Serial:86590211
Filed:Apr 7, 2015
Classes:9
CROWDSTRIKE THREAT GRAPH
REGISTERED
Owner:
Serial:86590212
Filed:Apr 7, 2015
Classes:9, 42, 45
Registration:5223665
Registered:Jun 13, 2017
Goods & Services
"THREAT GRAPH"
85963322
85963322
Service Mark
Design
REGISTERED
Owner:
Serial:85963322
Filed:Jun 18, 2013
Classes:45
Registration:4732156
Registered:May 5, 2015
Goods & Services
monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans for improving computer and network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network
85963314
85963314
Service Mark
Design
REGISTERED
Owner:
Serial:85963314
Filed:Jun 18, 2013
Classes:42
Registration:4732155
Registered:May 5, 2015
Goods & Services
computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers
85963304
85963304
Trademark
Design
REGISTERED
Owner:
Serial:85963304
Filed:Jun 18, 2013
Classes:9
Registration:4732154
Registered:May 5, 2015
Goods & Services
computer software for computer and network security
CROWDSTRIKE FALCON
CROWDSTRIKE FALCON
Trademark
Word
REGISTERED
Owner:
Serial:85982701
Filed:Feb 7, 2013
Classes:9, 45
Registration:4629491
Registered:Oct 28, 2014
Goods & Services
downloadable computer software for computer and network security; monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans for improving computer and network security for businesses and governmental agencies, namely, computer security assurance * and * administration of digital keys and digital certificates [, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions ] via a global computer network
CROWDSTRIKE FALCON
CROWDSTRIKE FALCON
Service Mark
Word
REGISTERED
Owner:
Serial:85843788
Filed:Feb 7, 2013
Classes:42
Registration:4720653
Registered:Apr 14, 2015
Goods & Services
computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers
CROWDRE
CROWDRE
Trademark
Word
CANCELLED
Owner:
Serial:85702530
Filed:Aug 13, 2012
Classes:9
Registration:4272420
Registered:Jan 8, 2013
YOU DON'T HAVE A MALWARE PROBLEM, YOU HAVE AN ADVERSARY PROBLEM
Owner:
Serial:85623622
Filed:May 11, 2012
Classes:9, 42, 45
Registration:4704110
Registered:Mar 17, 2015
Goods & Services
Class 009: downloadable computer software for computer and network security; Class 042: computer services, namely, on-line scanning, detecting, identifying, quarantining, and eliminating malware, targeted attacks and adversaries from computers, networks, and electronic devices; Class 045: monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans, namely, monitoring of computer systems for security purposes for improving computer and network security and preventing criminal activity for all types of businesses and governmental agencies
OODA LOOP
OODA LOOP
Trademark
Word
ABANDONED
Owner:
Serial:85541542
Filed:Feb 13, 2012
Classes:9
CLOUDSTRIKE
CLOUDSTRIKE
Trademark
Word
ABANDONED
Owner:
Serial:85514526
Filed:Jan 11, 2012
Classes:9
CROWDSTRIKE
CROWDSTRIKE
Service Mark
Word
REGISTERED
Owner:
Serial:85509811
Filed:Jan 5, 2012
Classes:45
Registration:4664091
Registered:Dec 30, 2014
Goods & Services
implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network
CROWDSTRIKE
CROWDSTRIKE
Trademark
Word
REGISTERED
Owner:
Serial:85978822
Filed:Jan 5, 2012
Classes:9, 42, 45
Registration:4336365
Registered:May 14, 2013
Goods & Services
downloadable computer software for computer and network security; Monitoring of computer systems for security purposes; provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, computer security assurance; Computer consultation; consulting in the field of information technology; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identification the source and genealogy of malware, and identifying the objectives of computer system attackers

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.