GleanMark is free for all of AprilGet free access
PALO ALTO NETWORKS, INC. logo

PALO ALTO NETWORKS, INC.

43 Marks
First Filed:Jan 2, 2007Latest Filed:Oct 28, 2025Address:3000 Tannery Way, Santa Clara, CA 95054, US

Portfolio Overview

Registered
22(51%)
Pending
11(26%)
Dead
10(23%)

Top Classes

Class 42
Software, IT Services & Scientific Research
32(74%)
Class 9
Electronics, Software & Scientific Equipment
22(51%)
Class 41
Education and Entertainment
4(9%)

TTAB Proceedings

Total Proceedings
6
As Plaintiff
1(17%)
As Defendant
5(83%)

Top Firms

KIRKLAND & ELLIS LLP(Oct 2025)
41
WILSON SONSINI GOODRICH & RO...(Aug 2016)
1

Trademark Activity Timeline(2007 – 2026)

Trademark Portfolio

43 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
IDIRA
IDIRA
Trademark
Word
ITU
PENDING
Owner:
Serial:99466436
Filed:Oct 28, 2025
Classes:9, 42
Goods & Services
Class 009: Computer hardware; Downloadable security software for sharing and storing sensitive information over an enterprise network and over the Internet; Downloadable security software for protecting, monitoring and detecting privileged accounts; Downloadable computer manuals for software for sharing and storing sensitive information, distributed integrally therewith; recorded and downloadable computer software for management of human and non-human digital identities; recorded and downloadable software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; recorded and downloadable computer software for access control management of human and non-human digital identities; recorded and downloadable computer software for securing, auditing, monitoring, reporting and analysis of computer systems, computer networks, cloud computing environments and enterprise software applications; recorded and downloadable computer software for detection, analysis and remediation of cyber threats; downloadable software for securing software development and operation pipelines; downloadable electronic instruction computer program manuals distributed with all of the foregoing software; Class 042: Design and development of computer hardware and software; software as a service (SAAS) services featuring software for managing digital identities; software as a service (SAAS) services featuring software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; software as a service (SAAS) services featuring software for managing access control of human and non-human digital identities; software as a service (SAAS) featuring software for securing, auditing, monitoring and analysis of computer systems, computer networks, cloud computing environments and enterprise software applications; software as a service (SAAS) services featuring software for detection, analysis and remediation of cyber threats; software as a service (SAAS) services featuring software for securing software development and operations pipelines
PRISMA BROWSER
PRISMA BROWSER
Trademark
Word
ITU
PENDING
Owner:
Serial:99441698
Filed:Oct 14, 2025
Classes:9, 42
Goods & Services
Class 009: Downloadable computer software for an enterprise browser for secure web browsing, internet access, and network security; downloadable software for cybersecurity, namely threat detection, malware prevention, data loss prevention, and secure remote access.; Class 042: Software as a service (SaaS) featuring software for an enterprise browser for secure web browsing, internet access, and network security; providing temporary use of non-downloadable software for cybersecurity, namely threat detection, malware prevention, data loss prevention, and secure remote access.
DEPLOY BRAVELY
DEPLOY BRAVELY
Trademark
Word
ITU
PENDING
Owner:
Serial:99398016
Filed:Sep 17, 2025
Classes:9, 42
Goods & Services
Class 009: Downloadable computer software for computer network security; Downloadable computer software for comprehensive security platform; Downloadable computer software for cybersecurity; Class 042: Software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services featuring software for comprehensive AI security platform; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for AI model scanning, posture management, AI red teaming, runtime security, and AI agent security; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, cloud detection and response
CORTEX EXTENDED DATA LAKE
CORTEX EXTENDED DATA LAKE
Service Mark
Word
ITU
PENDING
Owner:
Serial:99365687
Filed:Aug 29, 2025
Classes:42
Goods & Services
Class 042: Platform as a service (PAAS) featuring computer software platforms for unified data in the field of cybersecurity; Electronic data lake storage; Cloud storage services for electronic data lakes; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
CORTEX XDL
CORTEX XDL
Service Mark
Word
ITU
PENDING
Owner:
Serial:99365707
Filed:Aug 29, 2025
Classes:42
Goods & Services
Class 042: Platform as a service (PAAS) featuring computer software platforms for unified data in the field of cybersecurity; Electronic data lake storage; Cloud storage services for electronic data lakes; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
PRISMA AIRS
PRISMA AIRS
Trademark
Word
ITU
PENDING
Owner:
Serial:99312631
Filed:Jul 31, 2025
Classes:9, 42
Goods & Services
Downloadable computer software for computer network security; Downloadable computer software for comprehensive security platform; Downloadable computer software for cybersecurity; Software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services featuring software for comprehensive AI security platform; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for AI model scanning, posture management, AI red teaming, runtime security, and AI agent security; Software as a service (SAAS) services featuring software for comprehensive AI security platform featuring software for monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, cloud detection and response
CORTEX AGENTIX
CORTEX AGENTIX
Trademark
Word
ITU
PENDING
Owner:
Serial:99205771
Filed:May 28, 2025
Classes:9, 42
Goods & Services
Downloadable computer software for computer network security; downloadable computer software for security platform with agentic AI capabilities; downloadable computer software for security platform to build and orchestrate AI agents for computer network security; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores and user manuals for use therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all in the area of design and development of integrated circuits, microprocessors, and microprocessor cores.; Software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) for security platform with agentic AI capabilities; software as a service (SAAS) for security platform to build and orchestrate AI agents for computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
CORTEX CLOUD
CORTEX CLOUD
Trademark
Word
ITU
PENDING
Owner:
Serial:99206205
Filed:May 28, 2025
Classes:9, 42
Goods & Services
Downloadable computer software for computer network security; downloadable computer software for security platform with security operations capabilities; Downloadable computer software for security platform with cloud detection and response, cloud posture management, and application security; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores and user manuals for use therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all in the area of design and development of integrated circuits, microprocessors, and microprocessor cores.; Software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) for AI-driven cloud security platform with security operations capabilities; Software as a service (SAAS) for AI-driven cloud security platform with cloud detection and response, cloud posture management, and application security; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for enterprise and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, cloud detection and response; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
AGENTIX
AGENTIX
Trademark
Word
ITU
PENDING
Owner:
Serial:99200695
Filed:May 23, 2025
Classes:9, 42
Goods & Services
Downloadable computer software for computer network security; downloadable computer software for security platform with agentic AI capabilities; downloadable computer software for security platform to build and orchestrate AI agents for computer network security; Software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) for security platform with agentic AI capabilities; software as a service (SAAS) for security platform to build and orchestrate AI agents for computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection.
CODE TO CLOUD
CODE TO CLOUD
Service Mark
Word
REGISTERED
Owner:
Serial:98936222
Filed:Jan 3, 2025
Classes:42
Registration:8164589
Registered:Mar 10, 2026
Goods & Services
Providing temporary use of online non-downloadable cloud native software application protection platform for early unauthorized access and early threat detection and prevention system to ensure security, visibility, and control of software applications throughout the entire application life cycle process, including securing code, infrastructure, workloads, data, networks, cloud identities, web applications, and application programming interfaces across cloud-native environments, under a single unified user interface.
PRECISION AI
PRECISION AI
Service Mark
Word
ITU
PENDING
Owner:
Serial:98262728
Filed:Nov 9, 2023
Classes:42
Goods & Services
"AI"; Software as a service (SAAS) services featuring software using artificial intelligence for the monitoring of computer systems for security purposes, namely, for detecting, analyzing, preventing, and responding to threats of unauthorized access, data breaches, security violations, phishing attacks, ransomware, security vulnerabilities, and malware
CODE TO CLOUD
CODE TO CLOUD
Service Mark
Word
ABANDONED
Owner:
Serial:98166436
Filed:Sep 6, 2023
Classes:42
CORTEX XSIAM
CORTEX XSIAM
Service Mark
Word
REGISTERED
Owner:
Serial:97461376
Filed:Jun 16, 2022
Classes:42
Registration:7256225
Registered:Dec 26, 2023
Goods & Services
Providing temporary use of non-downloadable software for autonomous threat detection, collection, monitoring, and analysis of patterns for identifying cyber threats to network and cloud security; providing temporary use of non-downloadable cloud computing software using artificial intelligence for telemetry monitoring, and threat detection, intelligence, and response; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for autonomous management of security operations and incident response; providing temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; software as a service (SAAS) services featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; monitoring of computer systems for cybersecurity purposes, namely, for detecting unauthorized access and data breach; monitoring of computer systems' operation utilizing data associated with the configuration and behavior of networked computing systems; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; data automation and collection service using proprietary software to evaluate, analyze and collect service data; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores
CORTEX XPANSE
CORTEX XPANSE
Service Mark
Word
REGISTERED
Owner:
Serial:97433151
Filed:May 27, 2022
Classes:42
Registration:7930924
Registered:Sep 2, 2025
Goods & Services
Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; software as a service (saas) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; monitoring of computer systems' operation utilizing data associated with the configuration and behavior of networked computing systems; application service provider featuring application programming interface (api) software for downloading internet intelligence information, edge tracking remediation statuses, and information about risks on enterprise network edges; computer services, namely, electronic digitizing of documents and visual material in the nature of maps of internet connected assets and external facing protocols and services and mapping of data related to information technology assets and their associated behaviors; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; data mining; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing on-line non-downloadable software for use in connection with any one or more of the previously named services for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; providing on-line non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; development, maintenance, repair, and configuration of software for machine learning; development, maintenance, repair, and configuration of software for forecasting, predicting, and monitoring system failures; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; data security consultancy; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; development of technology in the field of electronic reporting for others using computers or sensors of information technology assets, computer networking systems and appliances, and cloud computing platforms for use in risk assessment, information security, business analysis, audit and audit planning, and process management
CORTEX XSOAR
CORTEX XSOAR
Trademark
Word
REGISTERED
Owner:
Serial:97433149
Filed:May 27, 2022
Classes:9, 35
Registration:7819529
Registered:Jun 3, 2025
Goods & Services
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patterns to identify cyber threats to network and cloud security; downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable software and applications for the management of security operations and incident response; downloadable software and applications for detecting, collecting, monitoring, and analyzing unauthorized access, data breaches, endpoint security violations, phishing attacks, ransomware, network security violations, cloud security violations, security vulnerabilities, and malware; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores; and user manuals for use therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all in the area of design and development of integrated circuits, microprocessors, and microprocessor cores; Operating an online marketplace featuring downloadable software, namely, applications for security automation and use in security operations centers
UNIT 42
UNIT 42
Service Mark
Word
REGISTERED
Owner:
Serial:97384403
Filed:Apr 27, 2022
Classes:42
Registration:7074437
Registered:Jun 6, 2023
Goods & Services
Promoting best practices and providing consumer information related to cybersecurity threat intelligence and risk management | Providing a website featuring non-downloadable educational resources in the nature of articles and reports in the fields of cybersecurity threat intelligence and risk management | Technology consultation in the field of computer and network security; research in the field of forensic science and information technology consulting services in the field of critical incident response to computer and network security breaches; Information technology consultation in the field of cybersecurity risk management
PALO DESIGN SYSTEM
PALO DESIGN SYSTEM
Service Mark
Word
ABANDONED
Owner:
Serial:97054062
Filed:Sep 30, 2021
Classes:41, 42
Goods & Services
Providing nondownloadable instructional materials and guidelines in the field of computer software application and user interface design via a website; "DESIGN SYSTEM"; Design and development of software featuring advisory materials and guidance for others in the field of design for computer software, user interface, and user experience
PALO ALTO NETWORKS
PALO ALTO NETWORKS
Service Mark
Word
REGISTERED
Owner:
Serial:90730344
Filed:May 24, 2021
Classes:45
Registration:6724559
Registered:May 24, 2022
Goods & Services
Class 045: Monitoring of computer systems for security purposes, namely, for detecting and preventing unauthorized access, data breaches, security violations, phishing attacks, ransomware, security vulnerabilities, and malware
CORTEX XDR
CORTEX XDR
Trademark
Word
REGISTERED
Owner:
Serial:90692924
Filed:May 6, 2021
Classes:9, 42
Registration:7805923
Registered:May 27, 2025
Goods & Services
Computer hardware, namely, firewalls and networks security devices in the nature of network routers; downloadable computer software for computer network security and network traffic analysis; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit; computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores; and user manuals for use therewith sold as a unit; electronic downloadable publications, namely, instruction and development manuals and datasheets, all in the area of design and development of integrated circuits, microprocessors, and microprocessor cores.; "XDR"; Technological consultation in the field of computer networking and network security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores.
OKYO GARDE
OKYO GARDE
Trademark
Word
REGISTERED
Owner:
Serial:90649885
Filed:Apr 16, 2021
Classes:9
Registration:6810283
Registered:Aug 2, 2022
Goods & Services
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networks for the purpose of providing cybersecurity protection; downloadable mobile applications for the operation of consumer network security devices | Providing temporary use of non-downloadable computer software for connecting, operating, and managing consumer network security; technological consultation in the field of computer networking and network security; monitoring of wireless routers, monitoring of computer systems for security purposes in the nature of cybersecurity, misconfigurations, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits; Providing information about cybersecurity devices via a global computer network
OKYO
OKYO
Trademark
Word
REGISTERED
Owner:
Serial:90467121
Filed:Jan 14, 2021
Classes:9
Registration:6761875
Registered:Jun 14, 2022
Goods & Services
Computer hardware, namely, firewalls and networks security devices in the nature of network routers, downloadable computer software for computer network and digital security | Technological support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network and digital security; software as a service (SAAS) services featuring software for use in computer network and digital security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network and digital security; monitoring of computer systems for security purposes in the nature of cybersecurity, misconfigurations, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits
88839942
88839942
Trademark
Design
REGISTERED
Owner:
Serial:88839942
Filed:Mar 19, 2020
Classes:9, 41, 42, +1
Registration:6188772
Registered:Nov 3, 2020
Goods & Services
Computer hardware, namely, firewalls and network security devices; downloadable computer software for computer network security
PALOALTO NETWORKS
PALOALTO NETWORKS
Trademark
Combined
REGISTERED
Owner:
Serial:88839943
Filed:Mar 19, 2020
Classes:9, 41, 42
Registration:6466267
Registered:Aug 31, 2021
Goods & Services
Class 009: Computer hardware, namely, firewalls and network security devices; downloadable computer software for computer network security; Class 041: Educational services, namely, arranging and conducting online and instructor-led courses, lectures and classes in the field of computer network security; Class 042: Technological consultation in the field of computer networking and network security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring temporary use of online nondownloadable computer software for use in computer network security; software as a service (SAAS) services, namely, hosting nondownloadable software for temporary use by others for use in computer network security
AXOR
AXOR
Trademark
Word
ITU
PENDING
Owner:
Serial:88759452
Filed:Jan 15, 2020
Classes:9, 42
Goods & Services
Downloadable computer software for monitoring, managing and securing computer systems and networks; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems and applications, excluding software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; downloadable computer software for management of business processes; downloadable computer software for information technology service automation; downloadable computer software for workflow and business process automation; downloadable computer software for the automation of customer operations in the field; downloadable computer software for performance analytics and monitoring and controlling communication between computers and automated machine systems, all excluding services in connection with sanitary products and their accessories, in particular for bath and kitchen, and furniture products; Planning, design and management of information technology systems; Computer services for monitoring and managing computer systems and networks and for on-site management of information technology (IT) systems of others; Computer services for securing computer systems and networks of others, namely, restricting unauthorized access to computer systems and networks of others; Computer project management services; Consulting services in the field of information technology; software implementation; software development, excluding software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Cloud hosting provider services; Implementation of computer technologies for others, namely, information technology automation services; Providing information in the field of information technology; Providing enterprise-level software as a service (SAAS) services featuring software for the management of computer-based information systems for businesses; Providing temporary use of non-downloadable software to others for managing, tracking, analyzing, and reporting data; developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications, excluding non-downloadable software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Management of information technology systems, namely, managing computer-based information systems for businesses; Implementation of computer technologies for others, namely, information technology service automation; providing temporary use of online non-downloadable computer software for workflow and business process automation; Information technology consulting services, namely, identifying elements of information technology infrastructure; Providing temporary use of online non-downloadable software for generating performance analytics for facilities management and automation; Information technology consulting services, namely, field service automation and application integration and to analyze, test, assess, configure, customize, and implement computer software; Infrastructure-as-service (IaaS) featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; Platform as a service (PAAS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications, excluding software platforms for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Software-as-a-service (SaaS) services featuring software for use in managing business processes; Cloud computing services, namely, cloud computing featuring software for use in developing, configuring, customizing and deploying software applications, excluding cloud computing featuring software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites, managing business processes, and managing computer-based information systems and monitoring, managing and securing computer systems and networks; providing temporary use of online non-downloadable computer software for monitoring, managing and securing computer systems and networks; providing temporary use of online non-downloadable computer software for performance analytics and monitoring and controlling communication between computers and automated machine systems, all excluding services in connection with sanitary products and their accessories, in particular for bath and kitchen, and furniture products
CORTEX XDR
CORTEX XDR
Trademark
Word
REGISTERED
Owner:
Serial:88690096
Filed:Nov 12, 2019
Classes:9, 42
Registration:6639813
Registered:Feb 8, 2022
Goods & Services
Class 009: Computer hardware, namely, firewalls and networks security devices in the nature of network routers, excluding integrated circuits, microprocessors and microprocessor cores; downloadable computer software for computer network security, excluding computer software used for designing and developing integrated circuits, microprocessors, and microprocessor cores; Class 042: Technological consultation in the field of computer networking and network security, excluding technological consultation in the field of integrated circuits, microprocessors, and microprocessor cores; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security, excluding technical support services for diagnosing computer hardware and software problems related to integrated circuits, microprocessors and microprocessor cores; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits
PRISMA
PRISMA
Trademark
Word
REGISTERED
Owner:
Serial:88300125
Filed:Feb 13, 2019
Classes:9, 42
Registration:6185839
Registered:Oct 27, 2020
Goods & Services
downloadable computer software for computer network security | technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, misconfigurations, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits
CORTEX
CORTEX
Service Mark
Word
REGISTERED
Owner:
Serial:88979203
Filed:Feb 8, 2019
Classes:42
Registration:6197209
Registered:Nov 10, 2020
Goods & Services
Technological consultation in the field of computer networking and network security, excluding technological consultation in the field of integrated circuits, microprocessors, and microprocessor cores; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security, excluding technical support services for diagnosing computer hardware and software problems related to integrated circuits, microprocessors and microprocessor cores; software as a service (SAAS) services featuring software for security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits
CORTEX
CORTEX
Trademark
Word
REGISTERED
Owner:
Serial:88293982
Filed:Feb 8, 2019
Classes:9
Registration:7255333
Registered:Dec 26, 2023
Goods & Services
Computer hardware, namely, firewalls and networks security devices in the nature of network routers, excluding integrated circuits, microprocessors and microprocessor cores; downloadable computer software for computer network security, excluding computer software used for designing and developing integrated circuits, microprocessors, and microprocessor cores; all excluding computer hardware, namely, integrated circuits, microprocessors, microprocessor cores, and user manuals for use therewith sold as a unit, computer software used in, and for use in the design and development of, integrated circuits, microprocessors, and microprocessor cores, and user manuals for use therewith sold as a unit
EXPANSE
EXPANSE
Service Mark
Word
REGISTERED
Owner:
Serial:88982960
Filed:Sep 9, 2018
Classes:42
Registration:6548603
Registered:Nov 2, 2021
Goods & Services
Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; software as a service (saas) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; application service provider featuring application programming interface (api) software for downloading internet intelligence information, edge tracking remediation statuses, and information about risks on enterprise network edges; computer services, namely, electronic digitizing of or data visualizations in the nature of maps of internet connected assets and external facing protocols and services and mapping of data related to information technology assets and their associated behaviors; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; data mining; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing on-line non-downloadable software for use in connection with any one or more of the previously named services for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; providing on-line non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; development, maintenance, repair, and configuration of software for machine learning; development, maintenance, repair, and configuration of software for forecasting, predicting, and monitoring system failures; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; data security consultancy; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; development of electronic reporting for others using computers or sensors of information technology assets, computer networking systems and appliances, and cloud computing platforms for use in risk assessment, information security, business analysis, audit and audit planning, and process management
SECURITY OPERATING PLATFORM
CANCELLED
Owner:
Serial:87879094
Filed:Apr 16, 2018
Classes:42
Registration:5724026
Registered:Apr 9, 2019
Goods & Services
"SECURITY" AND "PLATFORM"
WILDFIRE
WILDFIRE
Service Mark
Word
REGISTERED
Owner:
Serial:87376222
Filed:Mar 17, 2017
Classes:42
Registration:5306295
Registered:Oct 10, 2017
Goods & Services
Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; providing temporary use of non-downloadable cloud-based software for data security and protection
CLOUD SENTRY
CLOUD SENTRY
Service Mark
Word
ABANDONED
Owner:
Serial:87127167
Filed:Aug 4, 2016
Classes:41
Goods & Services
"CLOUD"
EXPANDER
EXPANDER
Service Mark
Word
REGISTERED
Owner:
Serial:86943147
Filed:Mar 16, 2016
Classes:42
Registration:5049813
Registered:Sep 27, 2016
Goods & Services
Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; Providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; Providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; Software as a service (SAAS) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks
E
E
Service Mark
Combined
CANCELLED
Owner:
Serial:86405852
Filed:Sep 25, 2014
Classes:42
Registration:4699940
Registered:Mar 10, 2015
EVIDENT.IO
EVIDENT.IO
Service Mark
Stylized
CANCELLED
Owner:
Serial:86405844
Filed:Sep 25, 2014
Classes:42
Registration:4699939
Registered:Mar 10, 2015
ESP
ESP
Service Mark
Word
CANCELLED
Owner:
Serial:86355166
Filed:Aug 1, 2014
Classes:42
Registration:4816119
Registered:Sep 22, 2015
EVIDENT.IO
EVIDENT.IO
Service Mark
Word
CANCELLED
Owner:
Serial:86355152
Filed:Aug 1, 2014
Classes:42
Registration:4699725
Registered:Mar 10, 2015
86026651
86026651
Trademark
Design
CANCELLED
Owner:
Serial:86026651
Filed:Aug 1, 2013
Classes:9
Registration:4739785
Registered:May 19, 2015
PALO ALTO NETWORKS
PALO ALTO NETWORKS
Service Mark
Word
REGISTERED
Owner:
Serial:86976202
Filed:Aug 1, 2013
Classes:45
Registration:4762250
Registered:Jun 23, 2015
Goods & Services
Class 045: monitoring of computer systems for security purposes
PALO ALTO NETWORKS
PALO ALTO NETWORKS
Trademark
Word
REGISTERED
Owner:
Serial:86026653
Filed:Aug 1, 2013
Classes:9, 42
Registration:4806335
Registered:Sep 8, 2015
Goods & Services
Class 009: computer hardware, namely, firewalls and networks security devices; computer software for computer network security; Class 042: technological consultation in the field of computer networking and network security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring software for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security
PALO ALTO NETWORKS
PALO ALTO NETWORKS
Trademark
Word
REGISTERED
Owner:
Serial:85637825
Filed:May 29, 2012
Classes:9
Registration:4323279
Registered:Apr 23, 2013
Goods & Services
Class 009: computer hardware, namely, firewalls
PALO ALTO NETWORKS
PALO ALTO NETWORKS
Trademark
Word
ABANDONED
Owner:
Serial:77074630
Filed:Jan 2, 2007
Classes:9
PAN-OS
PAN-OS
Trademark
Word
REGISTERED
Owner:
Serial:77074629
Filed:Jan 2, 2007
Classes:9
Registration:3450238
Registered:Jun 17, 2008
Goods & Services
Computer hardware, peripherals and manuals supplied therewith; computer software for enhancing the security of computer and communications networks by controlling unwanted, unauthorized, or malicious data, information, or computer programs from entering or leaving such networks

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.