SENTINELONE, INC. logo

SENTINELONE, INC.

29 Marks
Corp.
First Filed:Aug 12, 2014Latest Filed:Feb 28, 2024Address:444 Castro Street, Ste 400, Mountain View, CA 94041

Portfolio Overview

Registered
13(45%)
Pending
7(24%)
Dead
9(31%)

Top Classes

Class 42
Software, IT Services & Scientific Research
20(69%)
Class 9
Electronics, Software & Scientific Equipment
10(34%)
Class 36
Insurance, Financial Services & Real Estate
5(17%)

TTAB Proceedings

Total Proceedings
6
As Plaintiff
1(17%)
As Defendant
5(83%)

Top Firms

PERKINS COIE LLP(Feb 2024)
20
Danielson Legal LLC(Feb 2024)
8

Trademark Activity Timeline(2014 – 2025)

Trademark Portfolio

29 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
EXPLOIT PATH
EXPLOIT PATH
Service Mark
Word
ABANDONED
Owner:
Serial:98425204
Filed:Feb 28, 2024
Classes:42
Goods & Services
Computer software feature for cloud infrastructure security, sold as an integral component of online non-downloadable software for cybersecurity; Computer software feature for emulating and simulating a cybersecurity attack, and collecting, analyzing and reporting associated data, sold as an integral component of online non-downloadable software for cybersecurity
VERIFIED EXPLOIT PATH
VERIFIED EXPLOIT PATH
Service Mark
Word
ABANDONED
Owner:
Serial:98423292
Filed:Feb 27, 2024
Classes:42
Goods & Services
Computer software feature for cloud infrastructure security, sold as an integral component of online non-downloadable software for cybersecurity; Computer software feature for emulating and simulating a cybersecurity attack, and collecting, analyzing and reporting associated data, sold as an integral component of online non-downloadable software for cybersecurity.
98400121
98400121
Trademark
Design
PENDING
Owner:
Serial:98400121
Filed:Feb 9, 2024
Classes:9, 35, 36, +2
Goods & Services
Educational services, namely, providing speakers in the field of cybersecurity; providing a website featuring educational training in the field of cybersecurity; Providing educational blogs and non-downloadable publications in the nature of articles, research papers, and newsletters in the fields of cybersecurity, computer security, computer network security, and computer network endpoint security via a website; Downloadable software, namely a suite of downloadable cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Downloadable computer software for computer security incident tracking; Downloadable software for Internet of Things (IOT) device and end point discovery and management; Downloadable software for connected device discovery and management; Downloadable software for computer network mapping; Downloadable software for managing the cyber security of environments combining computing devices and related networks; Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Downloadable software to search for and index electronic data relating to cybersecurity incidents and threats; Downloadable software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Downloadable software for accessing third-party computer software and associated data; Downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Downloadable software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Downloadable chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Downloadable software for detecting, misdirecting, and attracting cybersecurity threats; Downloadable software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Downloadable software for ingestion, storage, and analysis of computer security electronic data and information technology electronic data; Downloadable software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Downloadable computer software platforms for providing cloud security; Downloadable software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing goods are for use in medical diagnosis or medical monitoring; Capital investment services in the field of technology companies; Venture capital advisory services in the field of technology companies; Venture capital financing in the field of technology companies; Business consulting in the field of cybersecurity; political consulting in the field of cybersecurity; marketing services, namely, providing a website promoting the goods and services of others by featuring third-party computer software solutions that are compatible with proprietary software and Software as a Service services; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software platforms and cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer network security software platforms and computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer security incident tracking; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for Internet of Things (IOT) device and end point discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for connected device discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer network mapping; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for managing the cyber security of environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software to search for and index electronic data relating to cybersecurity incidents and threats; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for accessing third-party computer software and associated data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Software development and design services in the field of cyber security and secure network operations; IT consultancy services relating to cybersecurity; IT security, protection and restoration services, namely, threat analysis, environment and configuration analysis and remediation; computer security services, namely, managed detection and response services and digital forensics and incident response services; maintenance and updating of computer software in the field of cyber and computer security; technical consulting in the field of cybersecurity; cybersecurity services in the nature of analyzing the computer networks, hardware, software, and business practices of others for security vulnerabilities, and proposing potential solutions; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for detecting, misdirecting, and attracting cybersecurity threats; Platform as a Service (PaaS) services and Software as a service featuring computer software platforms and software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingestion, storage, analysis of computer security electronic data and information technology electronic data; computer security services, namely, cybersecurity threat hunting and detection services for others; providing a website featuring an online database of known cybersecurity threats; computer cybersecurity services provided to others, namely, managed detection and response to cyberthreats; technical support services, namely, troubleshooting cybersecurity software problems; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for providing cloud security; Software development in the field of cloud security; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing services are for use in medical diagnosis or medical monitoring
SENTINELONE
SENTINELONE
Trademark
Combined
PENDING
Owner:
Serial:98400133
Filed:Feb 9, 2024
Classes:9, 42
Goods & Services
Downloadable software, namely a suite of downloadable cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Downloadable computer software for computer security incident tracking; Downloadable software for Internet of Things (IOT) device and end point discovery and management; Downloadable software for connected device discovery and management; Downloadable software for computer network mapping; Downloadable software for managing the cyber security of environments combining computing devices and related networks; Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Downloadable software to search for and index electronic data relating to cybersecurity incidents and threats; Downloadable software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Downloadable software for accessing third-party computer software and associated data; Downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Downloadable software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Downloadable chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Downloadable software for detecting, misdirecting, and attracting cybersecurity threats; Downloadable software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Downloadable software for ingestion, storage, and analysis of computer security electronic data and information technology electronic data; Downloadable software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Downloadable computer software platforms for providing cloud security; Downloadable software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing goods are for use in medical diagnosis or medical monitoring; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software platforms and cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer network security software platforms and computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer security incident tracking; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for Internet of Things (IOT) device and end point discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for connected device discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer network mapping; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for managing the cyber security of environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software to search for and index electronic data relating to cybersecurity incidents and threats; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for accessing third-party computer software and associated data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Software development and design services in the field of cyber security and secure network operations; IT consultancy services relating to cybersecurity; IT security, protection and restoration services, namely, threat analysis, environment and configuration analysis and remediation; computer security services, namely, managed detection and response services and digital forensics and incident response services; maintenance and updating of computer software in the field of cyber and computer security; technical consulting in the field of cybersecurity; cybersecurity services in the nature of analyzing the computer networks, hardware, software, and business practices of others for security vulnerabilities, and proposing potential solutions; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for detecting, misdirecting, and attracting cybersecurity threats; Platform as a Service (PaaS) services and Software as a service featuring computer software platforms and software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingestion, storage, analysis of computer security electronic data and information technology electronic data; computer security services, namely, cybersecurity threat hunting and detection services for others; providing a website featuring an online database of known cybersecurity threats; computer cybersecurity services provided to others, namely, managed detection and response to cyberthreats; technical support services, namely, troubleshooting cybersecurity software problems; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for providing cloud security; Software development in the field of cloud security; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing services are for use in medical diagnosis or medical monitoring
SENTINELONE
SENTINELONE
Trademark
Word
PENDING
Owner:
Serial:98400167
Filed:Feb 9, 2024
Classes:9, 42
Goods & Services
Downloadable software, namely a suite of downloadable cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Downloadable computer software for computer security incident tracking; Downloadable software for Internet of Things (IOT) device and end point discovery and management; Downloadable software for connected device discovery and management; Downloadable software for computer network mapping; Downloadable software for managing the cyber security of environments combining computing devices and related networks; Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Downloadable software to search for and index electronic data relating to cybersecurity incidents and threats; Downloadable software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Downloadable software for accessing third-party computer software and associated data; Downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Downloadable software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Downloadable chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Downloadable software for detecting, misdirecting, and attracting cybersecurity threats; Downloadable software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Downloadable software for ingestion, storage, and analysis of computer security electronic data and information technology electronic data; Downloadable software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Downloadable computer software platforms for providing cloud security; Downloadable software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing goods are for use in medical diagnosis or medical monitoring; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software platforms and cybersecurity software and software development tools for managing, protecting, detecting and analyzing cybersecurity threats and intelligence information, endpoint security, and cyber threat protection; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer network security software platforms and computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer security incident tracking; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for Internet of Things (IOT) device and end point discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for connected device discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for computer network mapping; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for managing the cyber security of environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software to search for and index electronic data relating to cybersecurity incidents and threats; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for accessing third-party computer software and associated data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Software development and design services in the field of cyber security and secure network operations; IT consultancy services relating to cybersecurity; IT security, protection and restoration services, namely, threat analysis, environment and configuration analysis and remediation ; computer security services, namely, managed detection and response services and digital forensics and incident response services; maintenance and updating of computer software in the field of cyber and computer security; technical consulting in the field of cybersecurity; cybersecurity services in the nature of analyzing the computer networks, hardware, software, and business practices of others for security vulnerabilities, and proposing potential solutions; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring chatbot software using artificial intelligence (AI) for detecting, responding to, investigating, and receiving and sharing summaries regarding cybersecurity threats and attacks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for detecting, misdirecting, and attracting cybersecurity threats; Platform as a Service (PaaS) services and Software as a service featuring computer software platforms and software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for ingestion, storage, analysis of computer security electronic data and information technology electronic data; computer security services, namely, cybersecurity threat hunting and detection services for others; providing a website featuring an online database of known cybersecurity threats; computer cybersecurity services provided to others, namely, managed detection and response to cyberthreats; technical support services, namely, troubleshooting cybersecurity software problems; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation and certification; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for providing cloud security; Software development in the field of cloud security; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software platforms and software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence; none of the foregoing services are for use in medical diagnosis or medical monitoring
SENTINELONE
SENTINELONE
Service Mark
Word
PENDING
Owner:
Serial:98400158
Filed:Feb 9, 2024
Classes:35, 36, 41
Goods & Services
Educational services, namely, providing speakers in the field of cybersecurity; providing a website featuring educational training in the field of cybersecurity; Providing educational blogs and non-downloadable publications in the nature of articles, research papers, and newsletters in the fields of cybersecurity, computer security, computer network security, and computer network endpoint security via a website; Capital investment services in the field of technology companies; Venture capital advisory services in the field of technology companies; Venture capital financing in the field of technology companies; Business consulting in the field of cybersecurity; political consulting in the field of cybersecurity; marketing services, namely, providing a website promoting the goods and services of others by featuring third-party computer software solutions that are compatible with proprietary software and Software as a Service services
SENTINELONE
SENTINELONE
Service Mark
Combined
PENDING
Owner:
Serial:98400147
Filed:Feb 9, 2024
Classes:35, 36, 41
Goods & Services
Educational services, namely, providing speakers in the field of cybersecurity; providing a website featuring educational training in the field of cybersecurity; Providing educational blogs and non-downloadable publications in the nature of articles, research papers, and newsletters in the fields of cybersecurity, computer security, computer network security, and computer network endpoint security via a website; Capital investment services in the field of technology companies; Venture capital advisory services in the field of technology companies; Venture capital financing in the field of technology companies; Business consulting in the field of cybersecurity; political consulting in the field of cybersecurity; marketing services, namely, providing a website promoting the goods and services of others by featuring third-party computer software solutions that are compatible with proprietary software and Software as a Service services
PINNACLEONE STRATEGIC ADVISORY GROUP
Owner:
Serial:98238522
Filed:Oct 24, 2023
Classes:41
Goods & Services
Educational services, namely, providing speakers in the field of cybersecurity; "STRATEGIC ADVISORY GROUP"
S
S
Service Mark
Stylized
REGISTERED
Owner:
Serial:97919196
Filed:May 3, 2023
Classes:36
Registration:7539109
Registered:Oct 15, 2024
Goods & Services
Capital investment services in the field of technology companies; Venture capital advisory services in the field of technology companies; Venture capital financing in the field of technology companies
PURPLE AI
PURPLE AI
Service Mark
Word
PENDING
Owner:
Serial:97897322
Filed:Apr 19, 2023
Classes:42
Goods & Services
"AI"; Providing online non-downloadable cybersecurity chatbot software using artificial intelligence (AI) for enabling natural-language cybersecurity threat and attack prediction, response, investigation and analysis
SECURE TOMORROW
SECURE TOMORROW
Service Mark
Word
ABANDONED
Owner:
Serial:97819557
Filed:Mar 2, 2023
Classes:42
Goods & Services
Platform as a Service (PaaS) services featuring computer software platforms containing a suite of software for cybersecurity, computer and network security, scanning and penetration testing of computers and networks to assess information security vulnerability, identifying the objectives of computer system attackers and protecting data and information from unauthorized access; Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; providing online non-downloadable software for computer security incident tracking; providing temporary use of on-line non-downloadable software for connecting, operating, and managing networked discovery in the internet of things (IoT); providing temporary use of on-line non- downloadable software for connected device discovery and management; providing temporary use of on-line non-downloadable software for computer network mapping; providing a website featuring non-downloadable software for managing the cybersecurity of environments combining computing devices and related networks; providing a website featuring non-downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for managing the cybersecurity of environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; providing on-line non-downloadable cybersecurity software for searching and indexing electronic data relating to security incidents and threats; providing on-line non-downloadable software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Platform as a service (PAAS) featuring computer software platforms for accessing third-party computer software and associated data; providing temporary use of on-line non-downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; providing on-line non-downloadable cybersecurity software featuring technology for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources
97765836
97765836
Service Mark
Design
REGISTERED
Owner:
Serial:97765836
Filed:Jan 24, 2023
Classes:42
Registration:7314364
Registered:Feb 27, 2024
Goods & Services
Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for cloud security; Software development in the field of cloud security
PINGSAFE
PINGSAFE
Service Mark
Combined
REGISTERED
Owner:
Serial:97765883
Filed:Jan 24, 2023
Classes:42
Registration:7395981
Registered:May 28, 2024
Goods & Services
Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for cloud security; Software development in the field of cloud security
PINGSAFE
PINGSAFE
Service Mark
Word
REGISTERED
Owner:
Serial:97765803
Filed:Jan 24, 2023
Classes:42
Registration:7395979
Registered:May 28, 2024
Goods & Services
Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for cloud security; Software development in the field of cloud security
SINGULARITY
SINGULARITY
Trademark
Word
REGISTERED
Owner:
Serial:97339235
Filed:Mar 30, 2022
Classes:9, 42
Registration:7654903
Registered:Jan 14, 2025
Goods & Services
Downloadable software featuring a suite of cybersecurity software and tools; downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioralbased predictive execution modeling; computer software feature for computer security incident tracking, sold as an integral component of downloadable software; downloadable software for Internet of Things (IOT) device and end point discovery and management; downloadable software for connected device discovery and management; downloadable software for computer network mapping; downloadable software for managing the cyber security of environments combining computing devices and related networks; downloadable software for automated cyber threat protection, detection and remediation; downloadable software and applications for managing the cyber security of environments combining computing devices and related networks; downloadable software and applications for automated cyber threat protection, detection and remediation; computer software feature to search for and index electronic data relating to security incidents and threats, sold as an integral component of downloadable software for cybersecurity; computer software feature for ingesting and analyzing cybersecurity threat intelligence information, sold as an integral component of downloadable software for cybersecurity; downloadable computer software for accessing third-party computer software and associated data; downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; downloadable cybersecurity software featuring technology for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Platform as a Service (PaaS) services featuring a suite of cybersecurity software and tools; Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; computer software feature for computer security incident tracking, sold as an integral component of online non-downloadable software; providing temporary use of on-line non-downloadable software for Internet of Things (IOT) device and end point discovery and management; providing temporary use of on-line non-downloadable software for connected device discovery and management; providing temporary use of on-line non-downloadable software for computer network mapping; providing a website featuring non-downloadable software for managing the cyber security of environments combining computing devices and related networks; providing a website featuring non-downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for managing the cyber security of environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Computer software feature to search for and index electronic data relating to security incidents and threats, sold as an integral component of online non-downloadable software for cybersecurity; Computer software feature for ingesting, analyzing, and providing cybersecurity threat intelligence information, sold as an integral component of online non-downloadable software for cybersecurity; Platform as a service (PAAS) services featuring computer software for accessing third-party computer software and associated data; providing temporary use of on-line non-downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; providing non-downloadable cybersecurity software featuring technology for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources
97266804
97266804
Service Mark
Design
REGISTERED
Owner:
Serial:97266804
Filed:Feb 14, 2022
Classes:42
Registration:7050598
Registered:May 9, 2023
Goods & Services
Software as a Service (SaaS) and Platform as a Service (PaaS) services featuring software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources
DATASET
DATASET
Service Mark
Combined
REGISTERED
Owner:
Serial:97266800
Filed:Feb 14, 2022
Classes:42
Registration:7050597
Registered:May 9, 2023
Goods & Services
"DATA SET"; Software as a Service (SaaS) and Platform as a Service (PaaS) services featuring software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources
PALADIN
PALADIN
Service Mark
Word
ABANDONED
Owner:
Serial:97260681
Filed:Feb 9, 2022
Classes:35
SENTINELLABS
SENTINELLABS
Service Mark
Word
ABANDONED
Owner:
Serial:97153673
Filed:Dec 2, 2021
Classes:41
SENTINELONE VENTURES
SENTINELONE VENTURES
Service Mark
Word
ABANDONED
Owner:
Serial:97060643
Filed:Oct 5, 2021
Classes:36
Goods & Services
"VENTURES"
WE ARE XDR
WE ARE XDR
Trademark
Word
ABANDONED
Owner:
Serial:97011585
Filed:Sep 3, 2021
Classes:9
DEEP VISIBILITY
DEEP VISIBILITY
Service Mark
Word
REGISTERED
Owner:
Serial:90634345
Filed:Apr 9, 2021
Classes:42
Registration:6982893
Registered:Feb 21, 2023
Goods & Services
(Based on Use in Commerce) Computer software feature to search for and index electronic data relating to security incidents and threats, sold as an integral component of online non-downloadable software for cybersecurity
STORYLINE
STORYLINE
Service Mark
Word
REGISTERED
Owner:
Serial:90979211
Filed:Mar 9, 2021
Classes:42
Registration:7009323
Registered:Mar 28, 2023
Goods & Services
Computer software feature for computer security incident tracking, sold as an integral component of online non-downloadable software for cybersecurity
STORYLINE
STORYLINE
Trademark
Word
ABANDONED
Owner:
Serial:90568716
Filed:Mar 9, 2021
Classes:9
RANGER
RANGER
Trademark
Word
REGISTERED
Owner:
Serial:88378512
Filed:Apr 9, 2019
Classes:9, 42
Registration:6060067
Registered:May 19, 2020
Goods & Services
Downloadable computer software for Internet of Things (IOT) device discovery and management; Downloadable computer software for connected device discovery and management; Downloadable computer software for computer network mapping; Providing temporary use of on-line non-downloadable software for Internet of Things (IOT) device discovery and management; Providing temporary use of on-line non-downloadable software for connected device discovery and management; Providing temporary use of on-line non-downloadable software for computer network mapping
ACTIVEEDR
ACTIVEEDR
Service Mark
Word
REGISTERED
Owner:
Serial:88976755
Filed:Jan 18, 2019
Classes:42
Registration:6020644
Registered:Mar 24, 2020
Goods & Services
Providing a website featuring non-downloadable software for managing the cyber security of environments combining computing devices and related networks; providing a website featuring non-downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for managing the cyber security of environments combining computing devices and related networks; providing temporary use of on-line non-downloadable software and applications for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks
88218647
88218647
Trademark
Design
REGISTERED
Owner:
Serial:88218647
Filed:Dec 5, 2018
Classes:9, 42
Registration:5799329
Registered:Jul 9, 2019
Goods & Services
Multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Software as a service (SAA) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
SENTINELONE
SENTINELONE
Trademark
Combined
CANCELLED
Owner:
Serial:87739020
Filed:Dec 30, 2017
Classes:9, 42
Registration:5535017
Registered:Aug 7, 2018
Goods & Services
Multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
SENTINELONE
SENTINELONE
Trademark
Word
REGISTERED
Owner:
Serial:86364153
Filed:Aug 12, 2014
Classes:9, 42
Registration:4965316
Registered:May 24, 2016
Goods & Services
Multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.