PALO ALTO NETWORKS, INC.
43 Marks
First Filed:Jan 2, 2007Latest Filed:Oct 28, 2025Address:3000 Tannery Way, Santa Clara, CA 95054, US
Portfolio Overview
Registered
22(51%)Pending
11(26%)Dead
10(23%)Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 9
Electronics, Software & Scientific EquipmentClass 41
Education and EntertainmentTTAB Proceedings
Total Proceedings
6As Plaintiff
1(17%)As Defendant
5(83%)Top Firms
KIRKLAND & ELLIS LLP(Oct 2025)
41
WILSON SONSINI GOODRICH & RO...(Aug 2016)
1
Trademark Activity Timeline(2007 – 2026)
- Filings
- Registrations
Trademark Portfolio
43 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
43
0
Status
22
11
6
4
0
Mark Type
38
1
2
2
0
22
1
4
32
3
Goods & Services
Class 009: Computer hardware; Downloadable security software for sharing and storing sensitive information over an enterprise network and over the Internet; Downloadable security software for protecting, monitoring and detecting privileged accounts; Downloadable computer manuals for software for sharing and storing sensitive information, distributed integrally therewith; recorded and downloadable computer software for management of human and non-human digital identities; recorded and downloadable software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; recorded and downloadable computer software for access control management of human and non-human digital identities; recorded and downloadable computer software for securing, auditing, monitoring, reporting and analysis of computer systems, computer networks, cloud computing environments and enterprise software applications; recorded and downloadable computer software for detection, analysis and remediation of cyber threats; downloadable software for securing software development and operation pipelines; downloadable electronic instruction computer program manuals distributed with all of the foregoing software; Class 042: Design and development of computer hardware and software; software as a service (SAAS) services featuring software for managing digital identities; software as a service (SAAS) services featuring software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; software as a service (SAAS) services featuring software for managing access control of human and non-human digital identities; software as a service (SAAS) featuring software for securing, auditing, monitoring and analysis of computer systems, computer networks, cloud computing environments and enterprise software applications; software as a service (SAAS) services featuring software for detection, analysis and remediation of cyber threats; software as a service (SAAS) services featuring software for securing software development and operations pipelines
Goods & Services
Class 009: Downloadable computer software for an enterprise browser for secure web browsing, internet access, and network security; downloadable software for cybersecurity, namely threat detection, malware prevention, data loss prevention, and secure remote access.; Class 042: Software as a service (SaaS) featuring software for an enterprise browser for secure web browsing, internet access, and network security; providing temporary use of non-downloadable software for cybersecurity, namely threat detection, malware prevention, data loss prevention, and secure remote access.
Goods & Services
Class 009: Downloadable computer software for computer network security; Downloadable computer software for comprehensive security platform; Downloadable computer software for cybersecurity; Class 042: Software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services featuring software for comprehensive AI security platform; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for AI model scanning, posture management, AI red teaming, runtime security, and AI agent security; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, cloud detection and response
Goods & Services
Class 042: Platform as a service (PAAS) featuring computer software platforms for unified data in the field of cybersecurity; Electronic data lake storage; Cloud storage services for electronic data lakes; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
Goods & Services
Class 042: Platform as a service (PAAS) featuring computer software platforms for unified data in the field of cybersecurity; Electronic data lake storage; Cloud storage services for electronic data lakes; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
Goods & Services
Downloadable computer software for computer network security; Downloadable computer software for comprehensive security platform; Downloadable computer software for cybersecurity; Software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services featuring software for comprehensive AI security platform; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for AI model scanning, posture management, AI red teaming, runtime security, and AI agent security; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, cloud detection and response
Goods & Services
Downloadable computer software for computer network security; downloadable computer software for security platform with agentic AI capabilities; downloadable computer software for security platform to build and orchestrate AI agents for computer network security; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores and user manuals for use therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all in the area of design and development of integrated circuits, microprocessors, and microprocessor cores.; Software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) for security platform with agentic AI capabilities; software as a service (SAAS) for security platform to build and orchestrate AI agents for computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
Goods & Services
Downloadable computer software for computer network security; downloadable computer software for security platform with security operations capabilities; Downloadable computer software for security platform with cloud detection and response, cloud posture management, and application security; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores and user manuals for use therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all in the area of design and development of integrated circuits, microprocessors, and microprocessor cores.; Software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) for AI-driven cloud security platform with security operations capabilities; Software as a service (SAAS) for AI-driven cloud security platform with cloud detection and response, cloud posture management, and application security; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for enterprise and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, cloud detection and response; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
Goods & Services
Downloadable computer software for computer network security; downloadable computer software for security platform with agentic AI capabilities; downloadable computer software for security platform to build and orchestrate AI agents for computer network security; Software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) for security platform with agentic AI capabilities; software as a service (SAAS) for security platform to build and orchestrate AI agents for computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection.
Goods & Services
Providing temporary use of online non-downloadable cloud native software application protection platform for early unauthorized access and early threat detection and prevention system to ensure security, visibility, and control of software applications throughout the entire application life cycle process, including securing code, infrastructure, workloads, data, networks, cloud identities, web applications, and application programming interfaces across cloud-native environments, under a single unified user interface.
Goods & Services
"AI"; Software as a service (SAAS) services featuring software using artificial intelligence for the monitoring of computer systems for security purposes, namely, for detecting, analyzing, preventing, and responding to threats of unauthorized access, data breaches, security violations, phishing attacks, ransomware, security vulnerabilities, and malware
Goods & Services
Providing temporary use of non-downloadable software for autonomous threat detection, collection, monitoring, and analysis of patterns for identifying cyber threats to network and cloud security; providing temporary use of non-downloadable cloud computing software using artificial intelligence for telemetry monitoring, and threat detection, intelligence, and response; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for autonomous management of security operations and incident response; providing temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; software as a service (SAAS) services featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; monitoring of computer systems for cybersecurity purposes, namely, for detecting unauthorized access and data breach; monitoring of computer systems' operation utilizing data associated with the configuration and behavior of networked computing systems; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; data automation and collection service using proprietary software to evaluate, analyze and collect service data; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores
Goods & Services
Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; software as a service (saas) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; monitoring of computer systems' operation utilizing data associated with the configuration and behavior of networked computing systems; application service provider featuring application programming interface (api) software for downloading internet intelligence information, edge tracking remediation statuses, and information about risks on enterprise network edges; computer services, namely, electronic digitizing of documents and visual material in the nature of maps of internet connected assets and external facing protocols and services and mapping of data related to information technology assets and their associated behaviors; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; data mining; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing on-line non-downloadable software for use in connection with any one or more of the previously named services for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; providing on-line non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; development, maintenance, repair, and configuration of software for machine learning; development, maintenance, repair, and configuration of software for forecasting, predicting, and monitoring system failures; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; data security consultancy; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; development of technology in the field of electronic reporting for others using computers or sensors of information technology assets, computer networking systems and appliances, and cloud computing platforms for use in risk assessment, information security, business analysis, audit and audit planning, and process management
Goods & Services
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patterns to identify cyber threats to network and cloud security; downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable software and applications for the management of security operations and incident response; downloadable software and applications for detecting, collecting, monitoring, and analyzing unauthorized access, data breaches, endpoint security violations, phishing attacks, ransomware, network security violations, cloud security violations, security vulnerabilities, and malware; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores; and user manuals for use therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all in the area of design and development of integrated circuits, microprocessors, and microprocessor cores; Operating an online marketplace featuring downloadable software, namely, applications for security automation and use in security operations centers

Goods & Services
Promoting best practices and providing consumer information related to cybersecurity threat intelligence and risk management | Providing a website featuring non-downloadable educational resources in the nature of articles and reports in the fields of cybersecurity threat intelligence and risk management | Technology consultation in the field of computer and network security; research in the field of forensic science and information technology consulting services in the field of critical incident response to computer and network security breaches; Information technology consultation in the field of cybersecurity risk management

Goods & Services
Providing nondownloadable instructional materials and guidelines in the field of computer software application and user interface design via a website; "DESIGN SYSTEM"; Design and development of software featuring advisory materials and guidance for others in the field of design for computer software, user interface, and user experience

Goods & Services
Class 045: Monitoring of computer systems for security purposes, namely, for detecting and preventing unauthorized access, data breaches, security violations, phishing attacks, ransomware, security vulnerabilities, and malware

Goods & Services
Computer hardware, namely, firewalls and networks security devices in the nature of network routers; downloadable computer
software for computer network security and network traffic analysis; all excluding computer hardware, namely, integrated circuits,
microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for
use in the design and development of, integrated circuits, microprocessors, and microprocessor cores; and user manuals for use
therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all
in the area of design and development of integrated circuits, microprocessors, and microprocessor cores.; "XDR"; Technological consultation in the field of computer networking and network security; technical support services, namely,
troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security;
software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS)
services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services
featuring software for network traffic analysis; software as a service (SAAS) featuring software using cloud-based technology and
artificial intelligence for network security, end point security and cloud security; monitoring of computer systems for security
purposes in the nature of cybersecurity, unauthorized access, data breach, and detection; all excluding licensing of intellectual
property relating to integrated circuits, microprocessors, and microprocessor cores.

Goods & Services
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networks for the purpose of providing cybersecurity protection; downloadable mobile applications for the operation of consumer network security devices | Providing temporary use of non-downloadable computer software for connecting, operating, and managing consumer network security; technological consultation in the field of computer networking and network security; monitoring of wireless routers, monitoring of computer systems for security purposes in the nature of cybersecurity, misconfigurations, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits; Providing information about cybersecurity devices via a global computer network

Goods & Services
Computer hardware, namely, firewalls and networks security devices in the nature of network routers, downloadable computer software for computer network and digital security | Technological support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network and digital security; software as a service (SAAS) services featuring software for use in computer network and digital security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network and digital security; monitoring of computer systems for security purposes in the nature of cybersecurity, misconfigurations, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits

Goods & Services
Class 009: Computer hardware, namely, firewalls and network security devices; downloadable computer software for computer network security; Class 041: Educational services, namely, arranging and conducting online and instructor-led courses, lectures and classes in the field of computer network security; Class 042: Technological consultation in the field of computer networking and network security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring temporary use of online nondownloadable computer software for use in computer network security; software as a service (SAAS) services, namely, hosting nondownloadable software for temporary use by others for use in computer network security

Goods & Services
Downloadable computer software for monitoring, managing and securing computer systems and networks; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems and applications, excluding software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; downloadable computer software for management of business processes; downloadable computer software for information technology service automation; downloadable computer software for workflow and business process automation; downloadable computer software for the automation of customer operations in the field; downloadable computer software for performance analytics and monitoring and controlling communication between computers and automated machine systems, all excluding services in connection with sanitary products and their accessories, in particular for bath and kitchen, and furniture products; Planning, design and management of information technology systems; Computer services for monitoring and managing computer systems and networks and for on-site management of information technology (IT) systems of others; Computer services for securing computer systems and networks of others, namely, restricting unauthorized access to computer systems and networks of others; Computer project management services; Consulting services in the field of information technology; software implementation; software development, excluding software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Cloud hosting provider services; Implementation of computer technologies for others, namely, information technology automation services; Providing information in the field of information technology; Providing enterprise-level software as a service (SAAS) services featuring software for the management of computer-based information systems for businesses; Providing temporary use of non-downloadable software to others for managing, tracking, analyzing, and reporting data; developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications, excluding non-downloadable software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Management of information technology systems, namely, managing computer-based information systems for businesses; Implementation of computer technologies for others, namely, information technology service automation; providing temporary use of online non-downloadable computer software for workflow and business process automation; Information technology consulting services, namely, identifying elements of information technology infrastructure; Providing temporary use of online non-downloadable software for generating performance analytics for facilities management and automation; Information technology consulting services, namely, field service automation and application integration and to analyze, test, assess, configure, customize, and implement computer software; Infrastructure-as-service (IaaS) featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; Platform as a service (PAAS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications, excluding software platforms for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Software-as-a-service (SaaS) services featuring software for use in managing business processes; Cloud computing services, namely, cloud computing featuring software for use in developing, configuring, customizing and deploying software applications, excluding cloud computing featuring software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites, managing business processes, and managing computer-based information systems and monitoring, managing and securing computer systems and networks; providing temporary use of online non-downloadable computer software for monitoring, managing and securing computer systems and networks; providing temporary use of online non-downloadable computer software for performance analytics and monitoring and controlling communication between computers and automated machine systems, all excluding services in connection with sanitary products and their accessories, in particular for bath and kitchen, and furniture products

Goods & Services
Class 009: Computer hardware, namely, firewalls and networks security devices in the nature of network routers, excluding integrated circuits, microprocessors and microprocessor cores; downloadable computer software for computer network security, excluding computer software used for designing and developing integrated circuits, microprocessors, and microprocessor cores; Class 042: Technological consultation in the field of computer networking and network security, excluding technological consultation in the field of integrated circuits, microprocessors, and microprocessor cores; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security, excluding technical support services for diagnosing computer hardware and software problems related to integrated circuits, microprocessors and microprocessor cores; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits

Goods & Services
downloadable computer software for computer network security | technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, misconfigurations, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits

Goods & Services
Technological consultation in the field of computer networking and network security, excluding technological consultation in the field of integrated circuits, microprocessors, and microprocessor cores; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security, excluding technical support services for diagnosing computer hardware and software problems related to integrated circuits, microprocessors and microprocessor cores; software as a service (SAAS) services featuring software for security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits

Goods & Services
Computer hardware, namely, firewalls and networks security devices in the nature of network routers, excluding integrated circuits, microprocessors and microprocessor cores; downloadable computer software for computer network security, excluding computer software used for designing and developing integrated circuits, microprocessors, and microprocessor cores; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit, computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores, and user manuals for use therewith sold as a unit

Goods & Services
Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; software as a service (saas) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; application service provider featuring application programming interface (api) software for downloading internet intelligence information, edge tracking remediation statuses, and information about risks on enterprise network edges; computer services, namely, electronic digitizing of or data visualizations in the nature of maps of internet connected assets and external facing protocols and services and mapping of data related to information technology assets and their associated behaviors; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; data mining; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing on-line non-downloadable software for use in connection with any one or more of the previously named services for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; providing on-line non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; development, maintenance, repair, and configuration of software for machine learning; development, maintenance, repair, and configuration of software for forecasting, predicting, and monitoring system failures; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; data security consultancy; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; development of electronic reporting for others using computers or sensors of information technology assets, computer networking systems and appliances, and cloud computing platforms for use in risk assessment, information security, business analysis, audit and audit planning, and process management

Goods & Services
"SECURITY" AND "PLATFORM"

Goods & Services
Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; providing temporary use of non-downloadable cloud-based software for data security and protection

Goods & Services
"CLOUD"

Goods & Services
Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; Providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; Providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; Software as a service (SAAS) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks



Goods & Services
Class 045: monitoring of computer systems for security purposes

Goods & Services
Class 009: computer hardware, namely, firewalls and networks security devices; computer software for computer network security; Class 042: technological consultation in the field of computer networking and network security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security

Goods & Services
Class 009: computer hardware, namely, firewalls


Goods & Services
Computer hardware, peripherals and manuals supplied therewith; computer software for enhancing the security of computer and communications networks by controlling unwanted, unauthorized, or malicious data, information, or computer programs from entering or leaving such networks



