Cybereason Inc. logo

Cybereason Inc.

13 Marks
Corp.
First Filed:Jan 4, 2016Latest Filed:May 20, 2025Address:1250 Prospect Street, OL - 03, La Jolla, CA 92037

Portfolio Overview

Registered
8(62%)
Pending
1(8%)
Dead
4(31%)

Top Classes

Class 41
Education and Entertainment
10(77%)
Class 9
Electronics, Software & Scientific Equipment
9(69%)
Class 42
Software, IT Services & Scientific Research
8(62%)

TTAB Proceedings

Total Proceedings
3
As Plaintiff
3(100%)
As Defendant
0(0%)

Top Firms

Morgan, Lewis & Bockius LLP(May 2025)
13

Trademark Portfolio

13 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
MALICIOUS LIFE
MALICIOUS LIFE
Service Mark
Word
PENDING
Owner:
Serial:99193876
Filed:May 20, 2025
Classes:41
Goods & Services
Entertainment services, namely, providing podcasts in the field of cybersecurity
97265858
97265858
Trademark
Design
REGISTERED
Owner:
Serial:97265858
Filed:Feb 14, 2022
Classes:9, 41, 42
Registration:7496067
Registered:Sep 3, 2024
Goods & Services
Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; downloadable computer software for preventing unauthorized access to computers and computer networks
90488528
90488528
Trademark
Design
REGISTERED
Owner:
Serial:90488528
Filed:Jan 26, 2021
Classes:9, 41, 42
Registration:8045545
Registered:Dec 2, 2025
Goods & Services
(Based on Intent to Use) Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; (Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks; (Based on Use in Commerce) Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services featuring software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for predicting and monitoring security threats to computer networks; software as a service (SAAS) services featuring software for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services featuring software for data analytics; and providing online nondownloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; providing online nondownloadable computer software for preventing unauthorized access to computers and computer networks
90488539
90488539
Trademark
Design
ABANDONED
Owner:
Serial:90488539
Filed:Jan 26, 2021
Classes:9, 41, 42
Goods & Services
(Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks
90488535
90488535
Trademark
Design
REGISTERED
Owner:
Serial:90488535
Filed:Jan 26, 2021
Classes:9, 41, 42
Registration:8036012
Registered:Nov 25, 2025
Goods & Services
(Based on Intent to Use) Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; (Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks; (Based on Use in Commerce) Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services featuring software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for predicting and monitoring security threats to computer networks; software as a service (SAAS) services featuring software for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services featuring software for data analytics; and providing online nondownloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; providing online nondownloadable computer software for preventing unauthorized access to computers and computer networks
90488531
90488531
Trademark
Design
REGISTERED
Owner:
Serial:90488531
Filed:Jan 26, 2021
Classes:9, 41, 42
Registration:8036011
Registered:Nov 25, 2025
Goods & Services
(Based on Intent to Use) Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; (Based on Intent to Use) Downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; Downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; Downloadable computer software for preventing unauthorized access to computers and computer networks; (Based on Use in Commerce) Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services featuring software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services featuring software for predicting and monitoring security threats to computer networks; software as a service (SAAS) services featuring software for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services featuring software for data analytics; and providing online nondownloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing online nondownloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; providing online nondownloadable computer software for preventing unauthorized access to computers and computer networks
DEFENDERCON
DEFENDERCON
Service Mark
Word
REGISTERED
Owner:
Serial:90238425
Filed:Oct 6, 2020
Classes:41
Registration:6834655
Registered:Aug 30, 2022
Goods & Services
Organizing and conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security
87853802
87853802
Trademark
Design
REGISTERED
Owner:
Serial:87853802
Filed:Mar 28, 2018
Classes:9, 41, 42
Registration:5590368
Registered:Oct 23, 2018
Goods & Services
Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security; training services in the field of implementation and ongoing use of cyber security software; webinars in the field of cyber security; Computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; computer software for preventing unauthorized access to computers and computer networks; Software as a service (saas) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (saas) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, providing in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (saas) services for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (saas) services for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (saas) services for predicting and monitoring security threats to computer networks; software as a service (saas) services for preventing unauthorized access to computers and computer networks; software as a service (saas) services for data analytics
MALOP
MALOP
Service Mark
Word
ABANDONED
Owner:
Serial:87844016
Filed:Mar 21, 2018
Classes:41
CYBEREASON
CYBEREASON
Trademark
Word
REGISTERED
Owner:
Serial:87704594
Filed:Dec 1, 2017
Classes:9, 41, 42
Registration:6309264
Registered:Mar 30, 2021
Goods & Services
Computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; computer software for preventing unauthorized access to computers and computer networks | Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security | Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services for predicting and monitoring security threats to computer networks; software as a service (SAAS) services for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services for data analytics
CYBEREASON HUNT
CYBEREASON HUNT
Trademark
Word
ABANDONED
Owner:
Serial:87704601
Filed:Dec 1, 2017
Classes:9
CYBEREASON PROTECT
CYBEREASON PROTECT
Trademark
Word
ABANDONED
Owner:
Serial:87704590
Filed:Dec 1, 2017
Classes:9
Goods & Services
"PROTECT"
CYBEREASON
CYBEREASON
Service Mark
Word
REGISTERED
Owner:
Serial:86864404
Filed:Jan 4, 2016
Classes:42
Registration:5048399
Registered:Sep 27, 2016
Goods & Services
Software as a service (saas) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (saas) services for managing computer security and endpoint security

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.