MUSARUBRA US LLC logo

MUSARUBRA US LLC

11 Marks
LLC
First Filed:Nov 29, 2002Latest Filed:Oct 29, 2024Address:5000 HEADQUARTERS DR., PLANO, TX 75024

Portfolio Overview

Registered
5(45%)
Pending
1(9%)
Dead
5(45%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
9(82%)
Class 42
Software, IT Services & Scientific Research
7(64%)
Class 41
Education and Entertainment
2(18%)

TTAB Proceedings

No litigation activity

Top Firms

REED SMITH LLP(Oct 2024)
11

Trademark Portfolio

11 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
TRELLIX WISE
TRELLIX WISE
Trademark
Word
ITU
PENDING
Owner:
Serial:98827180
Filed:Oct 29, 2024
Classes:9, 42
Goods & Services
Downloadable and recorded computer software using artificial intelligence (AI) for automated threat detection and incident response; Downloadable and recorded computer software using artificial intelligence (AI) for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; Downloadable and recorded computer software using artificial intelligence (AI) for detecting, blocking and removing computer viruses, malware and threats; Downloadable and recorded computer software using artificial intelligence (AI) for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers as part of an extended detection and response technology; Downloadable and recorded computer software for providing automated Artificial Intelligence (AI) generated information and analysis for cyber security threat detection and incident response; Providing temporary use of on-line non-downloadable cloud-based software using artificial intelligence (AI) for automated threat detection and incident response; Providing temporary use of on-line non-downloadable cloud-based software using artificial intelligence (AI) for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; Providing temporary use of on-line non-downloadable cloud-based software using artificial intelligence (AI) for detecting, blocking and removing computer viruses, malware and threats; Providing temporary use of on-line non-downloadable cloud-based software using artificial intelligence (AI) for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers as part of an extended detection and response technology; Providing temporary use of on-line non-downloadable cloud-based software for providing automated Artificial Intelligence (AI) generated information and analysis for cyber security threat detection and incident response; Platform as a Service (PaaS) featuring computer software platforms using artificial intelligence (AI) for automated threat detection and incident response; Platform as a Service (PaaS) featuring computer software platforms using artificial intelligence (AI) for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; Platform as a Service (PaaS) featuring computer software platforms using artificial intelligence (AI) for detecting, blocking and removing computer viruses, malware and threats; Platform as a Service (PaaS) featuring computer software platforms using artificial intelligence (AI) for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers as part of an extended detection and response technology; Platform as a Service (PaaS) featuring computer software platforms for providing automated Artificial Intelligence (AI) generated information and analysis for cyber security threat detection and incident response
BRAID
BRAID
Trademark
Word
ABANDONED
Owner:
Serial:97336066
Filed:Mar 29, 2022
Classes:9
TRELLIX
TRELLIX
Trademark
Word
REGISTERED
Owner:
Serial:97225536
Filed:Jan 18, 2022
Classes:9, 42
Registration:7444085
Registered:Jul 9, 2024
Goods & Services
Downloadable and recorded computer utility software for configuring and maintaining functionality of computer systems; downloadable computer anti-virus software; downloadable and recorded computer software and computer hardware for providing enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computer security; downloadable and recorded computer software and computer hardware for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; downloadable and recorded computer software for the detection, blocking and removal of computer viruses, malware and other threats; downloadable and recorded computer communications software for monitoring, managing, filtering, and regulating electronic and wireless communications; downloadable and recorded computer software for protecting and securing computer networks and applications; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for detecting and repairing computer software and hardware; downloadable and recorded computer software and computer hardware for automatically confirming and enforcing computer security policies, for identifying computer security policy violations, and for generating computer security policy compliance reports; downloadable and recorded computer software and computer hardware for the management, administration and optimization of computer networks and applications; downloadable and recorded computer software and computer hardware for use in the monitoring and control of, and generating reports on, computer and online activity; downloadable and recorded computer software for creating and maintaining firewalls; computer hardware and downloadable and recorded computer software for protecting and securing computer systems and computer networks and applications; downloadable software for detecting and preventing intrusions on computer networks and for repairing computer networks; downloadable and recorded computer software and computer hardware for encrypting and authenticating data; downloadable and recorded computer software for protecting the identity protection, authentication of users, authenticating users, and controlling privacy control settings; downloadable and recorded computer software for providing secure storage and management of usernames and passwords; downloadable software for filtering content; computer hardware and downloadable and recorded computer software for automatically updating computer utility and security software; computer hardware and downloadable and recorded computer software for rating the security level of internet sites; downloadable and recorded computer software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; Providing temporary use of non-downloadable security software for protecting computer networks from unauthorized breach; providing temporary use of non-downloadable software for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; providing temporary use of non-downloadable software for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; providing temporary use of nondownloadable software for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use in conjunction with computer software and hardware; technology consultation in the field of cybersecurity; providing temporary use of non-downloadable software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; security as a service (SECaas) featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; security as a service (SECaas) featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; security as a service (SECaas) featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; security as a service (SECaas) featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; software as a service (SAAS) services featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; software as a service (SAAS) services featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; software as a service (SAAS) services featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; software as a service (SAAS) services featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; platform as a service (PAAS) featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; platform as a service (PAAS) featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; platform as a service (PAAS) featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; platform as a service (PAAS) featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; infrastructure as a service (IAAS) services, namely, hosting software for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others and all related to extended detection and response technology; computer security consulting, computer performance testing services, computer software research services and computer software advisory services all related to computer, data, and network security; technological research in the field of computer hardware; research of computer software; development and design of computer hardware and software; technical support services for others in the fields of computer, data, and network security, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; automatic updating of computer software; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; computer security threat analysis for protecting data in the nature of collecting, compiling, and analyzing data for the purpose of generating and transmitting reports on and ratings of the level of security of third party software residing on the computers of others; computer programming services for others in the fields of computer, data, and network security; computer forensics services; providing computer security information in the fields of network, data, and computer security; maintenance of computer software; monitoring of computer systems for security purposes to protect data and information from unauthorized access, namely, monitoring of computer systems for detecting unauthorized access or data breach; computer security services, namely, intrusion detection services in the nature of monitoring of computer systems for detecting unauthorized access or data breach, intrusion prevention services in the nature of restricting unauthorized access to computer networks and endpoints, vulnerability assessment services, and in the nature of computer security consultancy related to scanning and penetration testing of computer networks to assess information security vulnerability, and computer services in the nature of online detecting and removing of computer viruses and threats on computers; cybersecurity services in the nature of restricting unauthorized access to computer systems
CLOUDVISORY
CLOUDVISORY
Trademark
Word
REGISTERED
Owner:
Serial:90005880
Filed:Jun 17, 2020
Classes:9, 42
Registration:6244769
Registered:Jan 12, 2021
Goods & Services
Downloadable enterprise software for monitoring the security of cloud environments; Software as a service (SAAS) services featuring software for monitoring the security of cloud environments
FOUNDSTONE
FOUNDSTONE
Service Mark
Word
REGISTERED
Owner:
Serial:86923593
Filed:Feb 29, 2016
Classes:41, 42
Registration:5031998
Registered:Aug 30, 2016
Goods & Services
EDUCATIONAL AND TRAINING SERVICES, NAMELY, CONDUCTING ON-SITE TRAINING CLASSES RELATING TO COMPUTER SECURITY SYSTEMS AND POLICIES, AND EVALUATING AND SOLVING COMPUTER SECURITY PROBLEMS; COMPUTER CONSULTING SERVICES IN THE FIELDS OF COMPUTER SECURITY, DETECTION OF COMPUTER TAMPERING, EVALUATION, ASSESSMENT AND REPORTING OF COMPUTER SECURITY SYSTEMS; DEVELOPMENT AND IMPLEMENTATION OF COMPUTER SECURITY SYSTEMS AND POLICIES; CUSTOM DESIGN OF COMPUTER NETWORK SECURITY SYSTEMS AND NETWORKS FOR OTHERS; COMPUTER FORENSICS INVESTIGATIONS
FIREEYE
FIREEYE
Service Mark
Word
CANCELLED
Owner:
Serial:86028733
Filed:Aug 5, 2013
Classes:41
Registration:4633590
Registered:Nov 4, 2014
Goods & Services
Training with respect to detection of malware, unauthorized activities and intrusions, and remediation of security problems and vulnerabilities in computers, computer systems, networks, hardware, software applications, digital devices, digital data and mobile devices; information technology training services; providing information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices and generally in the field of information technology security and vulnerability
FIREEYE
FIREEYE
Trademark
Word
CANCELLED
Owner:
Serial:86027848
Filed:Aug 2, 2013
Classes:9, 42
Registration:4633584
Registered:Nov 4, 2014
Goods & Services
Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; computer hardware; computer peripherals; Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of providing network access to cyber-threat intelligence, to cyber-attack verification, and to security analysis of network traffic, emails, files, media computer software, and mobile applications; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments
FIREEYE
FIREEYE
Trademark
Combined
CANCELLED
Owner:
Serial:85725142
Filed:Sep 10, 2012
Classes:9, 42
Registration:4482007
Registered:Feb 11, 2014
Goods & Services
Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer software and computer hardware for detection, blocking and removal of computer viruses, rootkits, advanced persistent threats, malware, and malicious attacks; computer software and computer hardware for real-time detection, blocking, removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks; computer software for identifying and preventing malicious attacks on computers, computer systems, and digital devices; computer software and hardware providing secure virtual computer systems and virtual computer environments; Technical support services, namely, troubleshooting and support services in the nature of diagnosing computer hardware and software problems, providing back-up computer programs and facilities, virus removal, maintenance of computer software relating to computer security and prevention of computer risks, updating and maintenance of computer software, and software installation for computers, peripherals, USB devices, computer networks and mobile devices
FIREEYE
FIREEYE
Trademark
Combined
CANCELLED
Owner:
Serial:78805838
Filed:Feb 2, 2006
Classes:9
Registration:3386626
Registered:Feb 19, 2008
FIREEYE
FIREEYE
Trademark
Word
REGISTERED
Owner:
Serial:78710294
Filed:Sep 9, 2005
Classes:9, 42
Registration:3386418
Registered:Feb 19, 2008
Goods & Services
Computer hardware; computer peripherals; computer software for monitoring, filtering and reporting network traffic; computer software for detecting, reporting, blocking and eliminating viruses, worms, malware, spyware, unauthorized software and network attacks; Technical support services, namely, troubleshooting of computer hardware and software problems
EPOLICY ORCHESTRATOR
REGISTERED
Owner:
Serial:76471478
Filed:Nov 29, 2002
Classes:9
Registration:2769110
Registered:Sep 30, 2003
Goods & Services
computer utility software; computer software for the detection and removal of computer viruses; computer software for protecting and securing computer networks and applications; computer software for monitoring, measuring, tracking, and reporting the performance of computer applications and networks; computer software for managing, administering, deploying, and configuring computer applications and networks; computer software for updating and installing of computer software; and manuals provided together with each of the foregoing goods

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.