LOOKOUT, INC. logo

LOOKOUT, INC.

20 Marks
Corp.
First Filed:Sep 18, 2003Latest Filed:Aug 9, 2022Address:Boston, MA 02108

Portfolio Overview

Registered
7(35%)
Dead
13(65%)
Previous
2

Top Classes

Class 9
Electronics, Software & Scientific Equipment
16(80%)
Class 45
Personal services
2(10%)
Class 42
Software, IT Services & Scientific Research
2(10%)

TTAB Proceedings

Total Proceedings
5
As Plaintiff
4(80%)
As Defendant
1(20%)

Top Firms

Dergosits & Noah LLP(Aug 2022)
19
Markert & Cominolli PLLC(Oct 2012)
2

Trademark Activity Timeline(2003 – 2023)

Trademark Portfolio

22 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
97541547
97541547
Trademark
Design
REGISTERED
Owner:
Serial:97541547
Filed:Aug 9, 2022
Classes:9
Registration:7228259
Registered:Nov 28, 2023
Goods & Services
Downloadable computer software for identifying data which is transmitted in electronic form or otherwise for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Downloadable computer software for detecting and mitigating security threats directed toward users, endpoints, applications and data; Downloadable computer software for securing data during access to a computer network; Downloadable computer software for securing connectivity to a computer network; Downloadable computer software for securing computing hardware and software located at the edge of a network; Downloadable computer software for blocking access to and from malicious websites and links; Downloadable computer software for secure remote access to a network; Downloadable computer software for on-premises or cloud-based security policy enforcement; Downloadable computer software for capturing, storing, presenting credentials for authentication to multiple computer services; Downloadable computer software for enterprise digital rights management; and Downloadable computer software for phishing and content protection
LOOKOUT
LOOKOUT
Trademark
Word
REGISTERED
Owner:
Serial:97541543
Filed:Aug 9, 2022
Classes:9
Registration:7228258
Registered:Nov 28, 2023
Goods & Services
Downloadable computer software for identifying data which is transmitted in electronic form or otherwise for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Downloadable computer software for detecting and mitigating security threats directed toward users, endpoints, applications and data; Downloadable computer software for securing data during access to a computer network; Downloadable computer software for securing connectivity to a computer network; Downloadable computer software for securing computing hardware and software located at the edge of a network; Downloadable computer software for blocking access to and from malicious websites and links; Downloadable computer software for secure remote access to a network; Downloadable computer software for on-premises or cloud-based security policy enforcement; Downloadable computer software for capturing, storing, presenting credentials for authentication to multiple computer services; Downloadable computer software for enterprise digital rights management; and Downloadable computer software for phishing and content protection | Providing online non-downloadable software for identifying data which is transmitted in electronic form or otherwise for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Providing online non-downloadable software for detecting and mitigating security threats directed toward users, endpoints, applications and data; Providing online non-downloadable software for securing connectivity to a computer network; Providing online non-downloadable software for securing data during access to a computer network; Providing online non-downloadable software for securing computing hardware and software located at the edge of a network; Providing online non-downloadable software for blocking access to and from malicious websites and links; Providing online non-downloadable software for secure remote access to a network; Providing online non-downloadable software for on-premises or cloud-based security policy enforcement; Providing online non-downloadable software for capturing, storing, presenting credentials for authentication to multiple computer services; Providing online non-downloadable software for enterprise digital rights management; and Providing online non-downloadable software for phishing and content protection; Software as a Service (SaaS) featuring software for identifying data which is transmitted in electronic form or otherwise for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Software as a Service (SaaS) featuring software for detecting and mitigating security threats directed toward users, endpoints, applications and data; Software as a Service (SaaS) featuring software for securing connectivity to a computer network; Software as a Service (SaaS) featuring software for securing data during access to a computer network; Software as a Service (SaaS) featuring software for securing computing hardware and software located at the edge of a network; Software as a Service (SaaS) featuring software for blocking access to and from malicious websites and links; Software as a Service (SaaS) featuring software for secure remote access to a network; Software as a Service (SaaS) featuring software for on-premises or cloud-based security policy enforcement; Software as a Service (SaaS) featuring software for capturing, storing, presenting credentials for authentication to multiple computer services; Software as a Service (SaaS) featuring software for enterprise digital rights management; and Software as a Service (SaaS) featuring software for phishing and content protection; Connectivity as a Service (CaaS) featuring software for identifying data which is transmitted in electronic form or otherwise for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Connectivity as a Service (CaaS) featuring software for detecting and mitigating security threats directed toward users, endpoints, applications and data; Connectivity as a Service (CaaS) featuring software for securing connectivity to a computer network; Connectivity as a Service (CaaS) featuring software for securing data during access to a computer network; Connectivity as a Service (CaaS) featuring software for securing computing hardware and software located at the edge of a network; Connectivity as a Service (CaaS) featuring software for blocking access to and from malicious websites and links; Connectivity as a Service (CaaS) featuring software for secure remote access to a network; Connectivity as a Service (CaaS) featuring software for on-premises or cloud-based security policy enforcement; Connectivity as a Service (CaaS) featuring software for capturing, storing, presenting credentials for authentication to multiple computer services; Connectivity as a Service (CaaS) featuring software for enterprise digital rights management; and Connectivity as a Service (CaaS) featuring software for phishing and content protection; Platform as a Service (PaaS) featuring software for identifying data which is transmitted in electronic form or otherwise for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Platform as a Service (PaaS) featuring software for detecting and mitigating security threats directed toward users, endpoints, applications and data; Platform as a Service (PaaS) featuring software for securing connectivity to a computer network; Platform as a Service (PaaS) featuring software for securing data during access to a computer network; Platform as a Service (PaaS) featuring software for securing computing hardware and software located at the edge of a network; Platform as a Service (PaaS) featuring software for blocking access to and from malicious websites and links; Platform as a Service (PaaS) featuring software for secure remote access to a network; Platform as a Service (PaaS) featuring software for on-premises or cloud-based security policy enforcement; Platform as a Service (PaaS) featuring software for capturing, storing, presenting credentials for authentication to multiple computer services; Platform as a Service (PaaS) featuring software for enterprise digital rights management; and Platform as a Service (PaaS) featuring software for phishing and content protection; Hardware as a Service (HaaS) featuring software-defined wide area network (SD-WAN) hardware and software-defined web gateway hardware for providing secure remote access to the wide area network; Computer consultancy services, namely, computer software consultancy, computer technology consultancy
DAY OF SHECURITY
DAY OF SHECURITY
Service Mark
Word
REGISTERED
Owner:
Serial:88423038
Filed:May 9, 2019
Classes:41
Registration:5919575
Registered:Nov 26, 2019
Goods & Services
Educational services, namely, providing conferences, programs, and mentoring for women in the fields of cybersecurity
POST-PERIMETER SECURITY ALLIANCE
ABANDONED
Owner:
Serial:88423139
Filed:May 9, 2019
Classes:35
POWERED BY LOOKOUT
POWERED BY LOOKOUT
Trademark
Word
CANCELLED
Owner:
Serial:87526083
Filed:Jul 12, 2017
Classes:9, 42, 45
Registration:5543878
Registered:Aug 21, 2018
Goods & Services
Software for scanning mobile communication devices, and for assessing, reporting, and preventing security risks and privacy risks on mobile communication devices; software for assessing, reporting, and preventing the security risks and privacy risks of installing software designed for mobile communication devices that is available on websites and software repositories, and for assessing, reporting, and preventing the security risks and privacy risks of software after installation of the software on mobile communication devices; mobile communication device anti-virus software; internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; software for implementing security policy, spyware policy and privacy policy on a mobile communication device; software for preventing installation of undesired software on a mobile communication device; software for monitoring, backing up, preserving, and restoring mobile communications devices and mobile communications device data; software for locating, recovering, securing, and disabling a user's missing, stolen, or lost mobile communication device; software for remotely managing mobile communications devices; Monitoring of mobile communication devices for security purposes, namely, tracking , locating, and monitoring services for recovering lost or stolen mobile communication devices; Computer services for others in the fields of mobile communication device data, network data, network security, and privacy, security risks, and privacy risks, namely, software development and maintenance for managing mobile communication device data, security risks, and privacy risks; services for others in the fields of mobile communication device data, security risks, and privacy risks, namely, troubleshooting mobile communication device software problems and diagnosing mobile communication device hardware problems; application service provider featuring software for the detection, monitoring, and removal of security risks and privacy risks, for monitoring, protecting, and securing mobile communication devices, networks; computer security and privacy services, namely monitoring of mobile communication devices for detecting unauthorized access or data breach
PROTECTED BY LOOKOUT
PROTECTED BY LOOKOUT
Service Mark
Word
ABANDONED
Owner:
Serial:87525336
Filed:Jul 12, 2017
Classes:45
APP GENOME SEQUENCING
APP GENOME SEQUENCING
Service Mark
Word
ABANDONED
Owner:
Serial:86516260
Filed:Jan 27, 2015
Classes:42
Goods & Services
"APP"
HELIX
HELIX
Trademark
Word
ABANDONED
Owner:
Serial:86516262
Filed:Jan 27, 2015
Classes:9
MALRANK
MALRANK
Trademark
Word
ABANDONED
Owner:
Serial:86253828
Filed:Apr 16, 2014
Classes:9
HACKTRACK
HACKTRACK
Trademark
Word
ABANDONED
Owner:
Serial:86231289
Filed:Mar 25, 2014
Classes:9
EVERYTHING IS OK
EVERYTHING IS OK
Trademark
Word
CANCELLED
Owner:
Serial:85276369
Filed:Mar 24, 2011
Classes:9
Registration:4168937
Registered:Jul 3, 2012
CIPHERCLOUD
CIPHERCLOUD
Trademark
Word
CANCELLED
Owner:
Serial:85976766
Filed:Jan 13, 2011
Classes:9
Registration:4165941
Registered:Jun 26, 2012
LOOKOUT
LOOKOUT
Trademark
Combined
REGISTERED
Owner:
Serial:85169122
Filed:Nov 4, 2010
Classes:9
Registration:4054030
Registered:Nov 8, 2011
Goods & Services
Software for scanning mobile communication devices, and for assessing, reporting, and preventing security risks and privacy risks on mobile communication devices; software for assessing, reporting, and preventing the security risks and privacy risks of installing software designed for mobile communication devices that is available on websites and software repositories, and for assessing, reporting, and preventing the security risks and privacy risks of software after installation of the software on mobile communication devices; mobile communication device anti-virus software; internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; software for implementing security policy, spyware policy and privacy policy on a mobile communication device; software for preventing installation of undesired software on a mobile communication device; software for monitoring, backing up, preserving, and restoring mobile communications devices and mobile communications device data; software for locating, recovering, securing, and disabling a user's missing, stolen, or lost mobile communication device; software for remotely managing mobile communications devices | Providing remote user Internet access to archived data for mobile communication devices; providing remote user Internet access to mobile communication device functionality | Storage services for storing and archiving electronic user data | Computer services for others in the fields of mobile communication device data, network data, network security, and privacy, security risks, and privacy risks, namely, software development and maintenance for managing mobile communication device data, security risks, and privacy risks; services for others in the fields of mobile communication device data, security risks, and privacy risks, namely, troubleshooting mobile communication device software problems and diagnosing mobile communication device hardware problems; application service provider featuring software for the detection, monitoring, and removal of security risks and privacy risks, for monitoring, protecting, and securing mobile communication devices, networks | Monitoring of mobile communication devices for security purposes, namely, for security and privacy risks
LOOKOUT MOBILE SECURITY
LOOKOUT MOBILE SECURITY
Trademark
Combined
CANCELLED
Owner:
Serial:85169163
Filed:Nov 4, 2010
Classes:9
Registration:4054031
Registered:Nov 8, 2011
Goods & Services
"MOBILE SECURITY"
LOOKOUT MOBILE SECURITY
REGISTERED
Owner:
Serial:85167614
Filed:Nov 2, 2010
Classes:9
Registration:4057517
Registered:Nov 15, 2011
Goods & Services
"MOBILE SECURITY"
PROTECTED BY LOOKOUT
CANCELLED
Owner:
Serial:85167610
Filed:Nov 2, 2010
Classes:9
Registration:4183893
Registered:Jul 31, 2012
85140410
85140410
Trademark
Design
REGISTERED
Owner:
Serial:85140410
Filed:Sep 28, 2010
Classes:9
Registration:4068394
Registered:Dec 6, 2011
Goods & Services
Software for scanning mobile communication devices, and for assessing, reporting, and preventing security risks and privacy risks on mobile communication devices; software for assessing, reporting, and preventing the security risks and privacy risks of installing software designed for mobile communication devices that is available on websites and software repositories, and for assessing, reporting, and preventing the security risks and privacy risks of software after installation of the software on mobile communication devices; mobile communication device anti-virus software; internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; software for implementing security policy, spyware policy and privacy policy on a mobile communication device; software for preventing installation of undesired software on a mobile communication device; software for monitoring, backing up, preserving, and restoring mobile communications devices and mobile communications device data; software for locating, recovering, securing, and disabling a user's missing, stolen, or lost mobile communication device; software for remotely managing mobile communications devices
LOOKOUT
LOOKOUT
Trademark
Word
REGISTERED
Owner:
Serial:77842982
Filed:Oct 6, 2009
Classes:9
Registration:3964112
Registered:May 24, 2011
Goods & Services
Software for scanning mobile communication devices, and for assessing, reporting, and preventing security risks and privacy risks on mobile communication devices; software for assessing, reporting, and preventing the security risks and privacy risks of installing software designed for mobile communication devices that is available on websites and software repositories, and for assessing, reporting, and preventing the security risks and privacy risks of software after installation of the software on mobile communication devices; mobile communication device anti-virus software; internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; software for implementing security policy, spyware policy and privacy policy on a mobile communication device; software for preventing installation of undesired software on a mobile communication device; software for monitoring, backing up, preserving, and restoring mobile communications devices and mobile communications device data; software for locating, recovering, securing, and disabling a user's missing, stolen, or lost mobile communication device; software for remotely managing mobile communications devices | Providing remote user Internet access to archived data for mobile communication devices; providing remote user Internet access to mobile communication device functionality | Storage services for storing and archiving electronic user data | Computer services for others in the fields of mobile communication device data, network data, network security, and privacy, security risks, and privacy risks, namely, software development and maintenance for managing mobile communication device data, security risks, and privacy risks; services for others in the fields of mobile communication device data, security risks, and privacy risks, namely, troubleshooting mobile communication device software problems and diagnosing mobile communication device hardware problems; application service provider featuring software for the detection, monitoring, and removal of security risks and privacy risks, for monitoring, protecting, and securing mobile communication devices, networks | Monitoring of mobile communication devices for security purposes, namely, for security and privacy risks
APPADVISOR
APPADVISOR
Trademark
Word
ABANDONED
Owner:
Serial:77809211
Filed:Aug 20, 2009
Classes:9
VISUALLOOKOUT
VISUALLOOKOUT
Trademark
Word
CANCELLED
Owner:
Serial:78302202
Filed:Sep 18, 2003
Classes:9
Registration:2982895
Registered:Aug 9, 2005
SIGNAL FLARE
SIGNAL FLARE
Trademark
Word
Previous
REGISTERED
Owner:
Serial:85748654
Filed:Oct 8, 2012
Classes:9
Registration:4506514
Registered:Apr 1, 2014
Goods & Services
Feature of computer software for protecting against privacy risks and security risks in mobile communication devices; feature of software for scanning mobile communication devices, and for assessing, reporting, and preventing security risks and privacy risks on mobile communication devices; feature of downloadable software for assessing, reporting, and preventing the security risks and privacy risks of installing software designed for mobile communication devices that is available on websites and software repositories, and for assessing, reporting, and preventing the security risks and privacy risks of software after installation of the software on mobile communication devices; feature of mobile communication device anti-virus software; feature of internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; feature of software for implementing security policy, spyware policy and privacy policy on a mobile communication device; feature of software for preventing installation of undesired software on a mobile communication device; feature of software for monitoring, backing up, preserving, and restoring mobile communications devices and mobile communications device data; feature of software for locating, recovering, securing, and disabling a user's missing, stolen, or lost mobile communication device; feature of software for remotely managing mobile communications devices
SCREAM
SCREAM
Trademark
Word
Previous
REGISTERED
Owner:
Serial:85578971
Filed:Mar 23, 2012
Classes:9
Registration:4426826
Registered:Oct 29, 2013
Goods & Services
Downloadable ring tones for mobile devices; sound alarms; downloadable sound files and alert tones for locating and recovering a user's missing, stolen, or lost mobile communication device; a feature of computer or mobile device software, namely, a sound-based alarm that also emits flashing lights from the display, provided via computer or mobile device software for locating and recovering a user's missing, stolen, or lost mobile communication device; software for remotely managing mobile communications devices

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.