Cybereason Inc.
13 Marks
Corp.
First Filed:Jan 4, 2016Latest Filed:May 20, 2025Address:1250 Prospect Street, OL - 03, La Jolla, CA 92037
Portfolio Overview
Registered
8(62%)Pending
1(8%)Dead
4(31%)Top Classes
Class 41
Education and EntertainmentClass 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchTTAB Proceedings
Total Proceedings
3As Plaintiff
3(100%)As Defendant
0(0%)Top Firms
Morgan, Lewis & Bockius LLP(May 2025)
13
Trademark Portfolio
13 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
13
0
Status
8
1
0
4
0
Mark Type
7
0
6
0
0
9
10
8
Goods & Services
Entertainment services, namely, providing podcasts in the field of cybersecurity
Goods & Services
Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; downloadable computer software for preventing unauthorized access to computers and computer networks
Goods & Services
(Based on Intent to Use) Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; (Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks; (Based on Use in Commerce) Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services featuring software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for predicting and monitoring security threats to computer networks; software as a service (SAAS) services featuring software for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services featuring software for data analytics; and providing online nondownloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; providing online nondownloadable computer software for preventing unauthorized access to computers and computer networks
Goods & Services
(Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks
Goods & Services
(Based on Intent to Use) Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; (Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks; (Based on Use in Commerce) Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services featuring software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for predicting and monitoring security threats to computer networks; software as a service (SAAS) services featuring software for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services featuring software for data analytics; and providing online nondownloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; providing online nondownloadable computer software for preventing unauthorized access to computers and computer networks
Goods & Services
(Based on Intent to Use) Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; (Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks; (Based on Use in Commerce) Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services featuring software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for predicting and monitoring security threats to computer networks; software as a service (SAAS) services featuring software for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services featuring software for data analytics; and providing online nondownloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; providing online nondownloadable computer software for preventing unauthorized access to computers and computer networks
Goods & Services
Organizing and conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security
Goods & Services
Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; training services in the field of implementation and ongoing use of cyber security software; webinars in the field of cyber security; Computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; computer software for preventing unauthorized access to computers and computer networks; Software as a service (saas) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (saas) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, providing in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (saas) services for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (saas) services for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (saas) services for predicting and monitoring security threats to computer networks; software as a service (saas) services for preventing unauthorized access to computers and computer networks; software as a service (saas) services for data analytics
Goods & Services
Computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; computer software for preventing unauthorized access to computers and computer networks | Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security | Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services for predicting and monitoring security threats to computer networks; software as a service (SAAS) services for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services for data analytics
Goods & Services
"PROTECT"
Goods & Services
Software as a service (saas) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (saas) services for managing computer security and endpoint security