SERAPHIC ALGORITHMS LTD. logo

SERAPHIC ALGORITHMS LTD.

6 Marks
Other
First Filed:Apr 18, 2021Latest Filed:Jun 12, 2025Address:11 AHI-MEIR ST.,, Tel-Aviv Yafo, 6912611, IL

Portfolio Overview

Registered
5(83%)
Dead
1(17%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
6(100%)
Class 42
Software, IT Services & Scientific Research
3(50%)

TTAB Proceedings

Total Proceedings
2
As Plaintiff
0(0%)
As Defendant
2(100%)

Top Firms

SOROKER AGMON NORDMAN PTE. L...(Jun 2022)
4
Agmon Law(Jun 2025)
2

Trademark Portfolio

6 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
99230319
99230319
Trademark
Design
REGISTERED
Owner:
Serial:99230319
Filed:Jun 12, 2025
Classes:9, 42
Registration:8109518
Registered:Jan 20, 2026
Goods & Services
Downloadable computer software for providing browser security information; Downloadable computer software for providing information about configurations, vulnerabilities, and potential exposures; Downloadable computer software for identifying security gaps and misconfigurations; Downloadable computer software for performing cybersecurity related scanning; Downloadable computer software for simulating real-world browser-based attacks and emerging threats; Downloadable computer software for visualizing how cybercriminals exploit browsers and browser extensions; Downloadable computer programs for for analyzing internet uniform resource links and browser extensions; Computer programs, downloadable, for performing security assessment in the nature of downloadable progressive web application; Software as a service (SAAS) services featuring software for providing information about configurations, vulnerabilities, and potential exposures; Software as a service (SAAS) services featuring software for professional consultancy relating to browser security; Software as a service (SAAS) services featuring software for identifying security gaps and misconfigurations; Software as a service (SAAS) services featuring software for performing cybersecurity related scanning; Software as a service (SAAS) services featuring software for simulating real-world browser-based attacks and emerging threats; Software as a service (SAAS) services featuring software for visualizing how cybercriminals exploit browsers and browser extensions; Software as a service (SAAS) services featuring software for analyzing internet uniform resource links and browser extensions; Software as a service (SAAS) services featuring software for performing security assessment; Software as a service (SAAS) services featuring software for collecting, verifying, and transmitting data and information for use in browser security and cybersecurity
BROWSERTOTAL
BROWSERTOTAL
Trademark
Word
REGISTERED
Owner:
Serial:99230305
Filed:Jun 12, 2025
Classes:9, 42
Registration:8109515
Registered:Jan 20, 2026
Goods & Services
Downloadable computer software for providing browser security information; Downloadable computer software for providing information about configurations, vulnerabilities, and potential exposures; Downloadable computer software for identifying security gaps and misconfigurations; Downloadable computer software for performing cybersecurity related scanning; Downloadable computer software for simulating real-world browser-based attacks and emerging threats; Downloadable computer software for visualizing how cybercriminals exploit browsers and browser extensions; Downloadable computer programs for analyzing internet uniform resource links and browser extensions; Computer programs, downloadable, for performing security assessment in the nature of downloadable progressive web application; Software as a service (SAAS) services featuring software for providing information about configurations, vulnerabilities, and potential exposures; Software as a service (SAAS) services featuring software for professional consultancy relating to browser security; Software as a service (SAAS) services featuring software for identifying security gaps and misconfigurations; Software as a service (SAAS) services featuring software for performing cybersecurity related scanning; Software as a service (SAAS) services featuring software for simulating real-world browser-based attacks and emerging threats; Software as a service (SAAS) services featuring software for visualizing how cybercriminals exploit browsers and browser extensions; Software as a service (SAAS) services featuring software for analyzing internet uniform resource links and browser extensions; Software as a service (SAAS) services featuring software for performing security assessment; Software as a service (SAAS) services featuring software for collecting, verifying, and transmitting data and information for use in browser security and cybersecurity
97454392
97454392
Trademark
Design
REGISTERED
Owner:
Serial:97454392
Filed:Jun 12, 2022
Classes:9
Registration:7498206
Registered:Sep 10, 2024
Goods & Services
Downloadable computer software to protect, detect, prevent and test for software vulnerabilities and bugs; Downloadable computer application software to protect against malware attacks, vulnerabilities, viruses, phishing, ads, malicious advertising; Downloadable computer software for scanning, searching, testing, detecting, reporting and confirming vulnerabilities in web applications that may be downloaded from a global computer network; Downloadable computer utility software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; Downloadable computer software and hardware for providing network, Internet, and computer security; Downloadable computer software and hardware for automatically confirming and enforcing computer security policies, for identifying computer security policy violations, and for generating computer security policy compliance reports; Downloadable computer software and hardware for the management, administration and optimization of computer networks and applications; downloadable computer software and hardware for use in the monitoring and control of, and generating reports on, computer and online activity; Downloadable computer firewall software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for detecting, blocking, intercepting, quarantining, and removing malware and other threats to computer hardware and software; computer hardware and downloadable computer software for monitoring, managing, filtering, and regulating electronic and wireless communications and data transfer and for generating reports on the same; computer hardware and downloadable computer software for protecting and securing the integrity of data and preventing data loss on computer systems and computer networks and applications; Downloadable intrusion detection and prevention software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for detecting and repairing computer software and hardware vulnerabilities and problems; Downloadable computer software and devices in the nature of computer servers, and operating systems or applications for mobile devices, cloud resources, applications for encrypting and authenticating data; Downloadable computer software for providing online identity protection, authentication of users, and privacy control; Downloadable content filtering software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for automatically updating computer utility and security software; computer hardware and downloadable computer software for rating the security level of Internet sites; Downloadable computer software, namely, computer software patches for using in a security exploitation; Downloadable computer software to prevent clickjacking attempts; Downloadable computer software in relation to system scramble protection; Downloadable computer software to prevent cryptojacking attempts; Downloadable computer software to conduct internal network vulnerability scans; Downloadable computer software to prevent Man In the Middle attacks; Downloadable computer software to prevent phishing attempts; Downloadable computer software to prevent Cross-site request forgery; Downloadable computer software to protect SQL/SQLi databases; Downloadable computer software to protect against credential reuse; Downloadable computer software for session management and securing insecure sessions; Downloadable computer software for content filtering; Downloadable computer software for tracking users and user tracking protection; Downloadable computer software for blocking pop-ups and advertisements; Downloadable computer software for blocking web application programming interface (API's); Downloadable computer software for blocking URL Schemes; Downloadable computer software for blocking Telemetry gathering attempts; Downloadable computer software for securing Personally Identifiable Information (PII); Downloadable computer software for securing against Data loss prevention (DLP); Downloadable computer software for digital watermarking; Downloadable computer software to identify and notify a user regarding a credentials leak notification; Downloadable computer software to identify and notify a user regarding a Sensitive Data Leak Notifications; Downloadable computer software for enabling secure browsing; Downloadable computer software to prevent against spear-phishing attacks; Downloadable computer software to prevent against exploitation of web vulnerabilities exploitation (CSRF/XSS) and providing unique runtime telemetry enabling advanced government and policy enforcement capabilities; Downloadable computer software for bowser protection via the browser rendering engine; Downloadable computer software for protection and governance of unmanaged or third party devices; Downloadable computer software for protection of computer operating systems; Downloadable computer software for protecting and enforcing policy add-ons and for providing protection from attacks generated through aforesaid add-ons; Downloadable computer software for securing remote access; Downloadable computer software for endpoint detection protection; Downloadable computer software for protecting unsecured browsers; Downloadable cloud-based software for protecting and securing web access and web browsing; Downloadable cloud-based software for administering and monitoring computer programs' user activities
SERAPHIC
SERAPHIC
Trademark
Word
REGISTERED
Owner:
Serial:97454393
Filed:Jun 12, 2022
Classes:9
Registration:7498207
Registered:Sep 10, 2024
Goods & Services
Downloadable computer software to protect, detect, prevent and test for software vulnerabilities and bugs; Downloadable computer application software to protect against malware attacks, vulnerabilities, viruses, phishing, ads, malicious advertising; Downloadable computer software for scanning, searching, testing, detecting, reporting and confirming vulnerabilities in web applications that may be downloaded from a global computer network; Downloadable computer utility software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; Downloadable computer software and hardware for providing network, Internet, and computer security; Downloadable computer software and hardware for automatically confirming and enforcing computer security policies, for identifying computer security policy violations, and for generating computer security policy compliance reports; Downloadable computer software and hardware for the management, administration and optimization of computer networks and applications; downloadable computer software and hardware for use in the monitoring and control of, and generating reports on, computer and online activity; Downloadable computer firewall software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for detecting, blocking, intercepting, quarantining, and removing malware and other threats to computer hardware and software; computer hardware and downloadable computer software for monitoring, managing, filtering, and regulating electronic and wireless communications and data transfer and for generating reports on the same; computer hardware and downloadable computer software for protecting and securing the integrity of data and preventing data loss on computer systems and computer networks and applications; Downloadable intrusion detection and prevention software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for detecting and repairing computer software and hardware vulnerabilities and problems; Downloadable computer software and devices in the nature of computer servers, and operating systems or applications for mobile devices, cloud resources, applications for encrypting and authenticating data; Downloadable computer software for providing online identity protection, authentication of users, and privacy control; Downloadable content filtering software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for automatically updating computer utility and security software; computer hardware and downloadable computer software for rating the security level of Internet sites; Downloadable computer software, namely, computer software patches for using in a security exploitation; Downloadable computer software to prevent clickjacking attempts; Downloadable computer software in relation to system scramble protection; Downloadable computer software to prevent cryptojacking attempts; Downloadable computer software to conduct internal network vulnerability scans; Downloadable computer software to prevent Man In the Middle attacks; Downloadable computer software to prevent phishing attempts; Downloadable computer software to prevent Cross-site request forgery; Downloadable computer software to protect SQL/SQLi databases; Downloadable computer software to protect against credential reuse; Downloadable computer software for session management and securing insecure sessions; Downloadable computer software for content filtering; Downloadable computer software for tracking users and user tracking protection; Downloadable computer software for blocking pop-ups and advertisements; Downloadable computer software for blocking web application programming interface (API's); Downloadable computer software for blocking URL Schemes; Downloadable computer software for blocking Telemetry gathering attempts; Downloadable computer software for securing Personally Identifiable Information (PII); Downloadable computer software for securing against Data loss prevention (DLP); Downloadable computer software for digital watermarking; Downloadable computer software to identify and notify a user regarding a credentials leak notification; Downloadable computer software to identify and notify a user regarding a Sensitive Data Leak Notifications; Downloadable computer software for enabling secure browsing; Downloadable computer software to prevent against spear-phishing attacks; Downloadable computer software to prevent against exploitation of web vulnerabilities exploitation (CSRF/XSS) and providing unique runtime telemetry enabling advanced government and policy enforcement capabilities; Downloadable computer software for bowser protection via the browser rendering engine; Downloadable computer software for protection and governance of unmanaged or third party devices; Downloadable computer software for protection of computer operating systems; Downloadable computer software for protecting and enforcing policy add-ons and for providing protection from attacks generated through aforesaid add-ons; Downloadable computer software for securing remote access; Downloadable computer software for endpoint detection protection; Downloadable computer software for protecting unsecured browsers; Downloadable cloud-based software for protecting and securing web access and web browsing; Downloadable cloud-based software for administering and monitoring computer programs' user activities | Providing remote internet access, through the use of virtual private networks and virtual desktop environments | Computer security consultancy services; data security consulting; data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; internet security consultancy; computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer services for securing financial information in the nature of data encryption services; computer services for securing personal information in the nature of data encryption services; programming of Internet security programs; rental of Internet security software programs; technology services being computer services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; consultancy in the field of security software; design and development of Internet security computer programs; development of software for secure network operations; Computer services, namely, creating an online virtual environment for securities brokerage; professional consultancy relating to computer security; electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach; computer and Internet security consultancy and data encryption services; electronic monitoring services for computer security threat analysis for protecting data; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in computer security consultancy services in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in data security consulting in the field of computer and network security; providing online non-downloadable software for data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in internet security consultancy, in the field of computer and network security; providing online non-downloadable software for computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer services for securing financial information, in the field of computer and network security; Software as a service (SAAS) services featuring software for computer services for securing personal information, in the field of computer and network security; Software as a service (SAAS) services featuring software for programming of Internet security programs, in the field of computer and network security; Software as a service (SAAS) services featuring software for rental of Internet security programs in the field of computer and network security; providing online non-downloadable software for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; Software as a service (SAAS) services featuring software for use in consultancy in the field of security software for detecting computer security vulnerabilities, in the field of computer and network security; Software as a service (SAAS) services featuring software for design and development of Internet security computer programs, in the field of computer and network security; Software as a service (SAAS) services featuring software for development of software for secure network operations, in the field of computer and network security; providing online non-downloadable software for creating an online virtual environment for securities brokerage, in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer vulnerabilities and browser vulnerabilities for use in professional consultancy relating to computer security, in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach in the field of computer and network security; providing online non-downloadable software in the field of internet security for use in computer and Internet security consultancy and data encryption services for detecting computer security vulnerabilities, in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic monitoring featuring computer security threat analysis for protecting data, in the field of computer and network security; Software as a service (SAAS) services featuring software for maintenance of computer software relating to computer security and prevention of computer risks, in the field of computer and network security; Software as a service (SAAS) services featuring software for updating of computer software relating to computer security and prevention of computer risks in the field of computer and network security; Software as a service (SAAS) services featuring software for advanced browser privacy settings, bandwidth monitoring, weak password notification, user session management, extensions management, transparent proxy server, customizing new page behaviour, shadow IT discovery, safe browsing, zero trust security framework, privileged user account securitization, end-of-life support, and relating to software extensions management, all in the field of computer and network security; Software as a service (SAAS) services featuring software for secure browsing, in the field of computer and network security; Software as a service (SAAS) services featuring software to prevent against spear-phishing attacks in the field of computer and network security; Software as a service (SAAS) services featuring software for preventing against exploitation of web vulnerabilities exploitation (CSRF/XSS) and providing unique runtime telemetry enabling advanced government and policy enforcement capabilities in the field of computer and network security; providing online non-downloadable software for browser protection via the browser rendering engine, in the field of computer and network security; Software as a service (SAAS) services featuring software for protection and governance of unmanaged or third party devices in the field of computer and network security; Software as a service (SAAS) services featuring software for protection of computer operating systems in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting and enforcing policy on add-ons and for providing protection from attacks generated through aforesaid add-ons in the field of computer and network security; Software as a service (SAAS) services featuring software for securing remote access in the field of computer and network security; Software as a service (SAAS) services featuring software for endpoint detection protection in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting unsecured browsers, for providing non-downloadable cloud-based software for protecting and securing web access and web browsing, in the field of computer and network security; providing non-downloadable cloud-based software for administering and monitoring computer programs' user activities, in the field of computer and network security
SERAPHIC ALGORITHMS
SERAPHIC ALGORITHMS
Trademark
Word
REGISTERED
Owner:
Serial:90708088
Filed:May 13, 2021
Classes:9, 42
Registration:7077921
Registered:Jun 13, 2023
Goods & Services
Class 009: Downloadable computer software to protect, detect, prevent and test for software vulnerabilities and bugs; Downloadable computer application software to protect against malware attacks, vulnerabilities, viruses, phishing, ads, malicious advertising; Downloadable computer software for scanning, searching, testing, detecting, reporting and confirming vulnerabilities in web applications that may be downloaded from a global computer network; Downloadable computer utility software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; Downloadable computer software and hardware for providing network, Internet, and computer security; Downloadable computer software and hardware for automatically confirming and enforcing computer security policies, for identifying computer security policy violations, and for generating computer security policy compliance reports; Downloadable computer software and hardware for the management, administration and optimization of computer networks and applications; downloadable computer software and hardware for use in the monitoring and control of, and generating reports on, computer and online activity; Downloadable computer firewall software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for detecting, blocking, intercepting, quarantining, and removing malware and other threats to computer hardware and software; computer hardware and downloadable computer software for monitoring, managing, filtering, and regulating electronic and wireless communications and data transfer and for generating reports on the same; computer hardware and downloadable computer software for protecting and securing the integrity of data and preventing data loss on computer systems and computer networks and applications; Downloadable intrusion detection and prevention software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for detecting and repairing computer software and hardware vulnerabilities and problems; Downloadable computer software and devices in the nature of computer servers, and operating systems for mobile devices, cloud resources, applications for encrypting and authenticating data; Downloadable computer software for providing online identity protection, authentication of users, and privacy control; Downloadable content filtering software for protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer hardware and downloadable computer software for automatically updating computer utility and security software; computer hardware and downloadable computer software for rating the security level of Internet sites; Class 042: Computer security consultancy services; data security consulting; data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; internet security consultancy; computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer services for securing financial information; computer services for securing personal information; programming of Internet security programs; rental of Internet security programs; technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; consultancy in the field of security software; design and development of Internet security computer programs; development of software for secure network operations; Computer services, namely, creating an online virtual environment for securities brokerage; professional consultancy relating to computer security; electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach; computer and Internet security consultancy and data encryption services; electronic monitoring services for computer security threat analysis for protecting data; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks
BROWSERDOME
BROWSERDOME
Trademark
Combined
ABANDONED
Owner:
Serial:90653021
Filed:Apr 18, 2021
Classes:9

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.