SYSDIG, INC.
22 Marks
Corp.
First Filed:Mar 26, 2014Latest Filed:Nov 29, 2025Address:135 Main Street, Suite 2100, San Francisco, CA 94105
Portfolio Overview
Registered
9(41%)Pending
2(9%)Dead
11(50%)Previous
5Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchTTAB Proceedings
Total Proceedings
4As Plaintiff
0(0%)As Defendant
4(100%)Top Firms
Pranger Law PC(Nov 2025)
16
Law Office of Gwenn Roos(Mar 2019)
8
Hakimi Law PC(Dec 2018)
3
Trademark Activity Timeline(2014 – 2025)
- Filings
- Registrations
Trademark Portfolio
27 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
22
5
Status
14
2
4
7
0
Mark Type
17
0
6
4
0
15
3
10
Goods & Services
Class 042: Software as a service (SAAS) services featuring software using artificial intelligence (AI) for securitization of private and public cloud environments and workloads; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for design and implementation of cloud-based information systems and provisioning of workload security for businesses; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for design, development, implementation, maintenance, and updating of software for securing workloads operating in private and public clouds; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for cloud security in the field of scanning and penetration testing of cloud infrastructures and workloads to inventory and assess security vulnerabilities; Providing temporary use of online non-downloadable chatbot software for analyzing, preventing, and responding to security threats, attacks and vulnerabilities affecting cloud infrastructures and workloads, and for recommending strategies to prevent, remediate and/or respond to such security incidents in private and public cloud environments
Goods & Services
Downloadable software for analyzing, preventing and responding to security threats and attacks to a cloud infrastructure and environment; Downloadable chatbot software for analyzing, preventing and responding to security threats and attacks to a cloud infrastructure and environment; Downloadable software for recommending strategies to prevent security incidents in a cloud infrastructure and environment; Downloadable software for recommending strategies to respond to security incidents in a cloud infrastructure and environment; Providing temporary use of on-line non-downloadable software for analyzing, preventing and responding to security threats and attacks to a cloud infrastructure and environment; Providing temporary use of on-line non-downloadable chatbot software for analyzing, preventing and responding to security threats and attacks to a cloud infrastructure and environment; Providing temporary use of on-line non-downloadable software for recommending strategies to prevent security incidents in a cloud infrastructure and environment; Providing temporary use of on-line non-downloadable software for recommending strategies to respond to security incidents in a cloud infrastructure and environment
Goods & Services
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of security, monitoring, troubleshooting and forensics for cloud-based, container based, and host based application workloads and microservices; Computer services, namely, integration of private and public cloud computing environments; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Design, development and implementation of software; Design, development, and implementation of security software for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; Maintenance of computer software relating to computer security and prevention of computer risks; Providing virtual computer systems and virtual computer environments through cloud computing; Technical consulting in the field of artificial intelligence (AI) software customization; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for security, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; Software as a service (SAAS) services featuring software for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; Software as a service (SAAS) services featuring software using artificial intelligence for security, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; Software as a service (SAAS) services, namely, hosting software for use by others for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Goods & Services
Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for cloud-based, container based, and host based application workloads and microservices; Computer software platforms, recorded, for cloud-based, container based, and host based application workloads and microservices;; Downloadable cloud-based software for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, software for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network; Downloadable computer program manuals for monitoring and controlling communication between computers and automated machine systems; Downloadable computer software for use as an application programming interface (API); Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for cloud-based, container based, and host based application workloads and microservices; Downloadable computer software for for cloud-based, container based, and host based application workloads and microservices and instructional user guides sold as a unit; Downloadable computer software platforms for cloud-based, container based, and host based application workloads and microservices; Downloadable computer software using artificial intelligence for cloud-based, container based, and host based application workloads and microservices; Downloadable computer operating software; Downloadable enterprise software for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, software for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable cloud-computing software for cloud-based, container based, and host based application workloads and microservices; Recorded computer programs using artificial intelligence for cloud-based, container based, and host based application workloads and microservices; Recorded computer software using artificial intelligence for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports
Goods & Services
Recorded computer software using artificial intelligence for security, namely, software that provides security capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Goods & Services
Computer services, namely, integration of private and public cloud computing environments; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Design, development and implementation of software; Providing virtual computer systems and virtual computer environments through cloud computing; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Maintenance of computer software relating to computer security and prevention of computer risks; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical consulting in the field of artificial intelligence (AI) software customization; Updating of computer software relating to computer security and prevention of computer risks
Goods & Services
Computer services, namely, integration of private and public cloud computing environments; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Design, development and implementation of software; Providing virtual computer systems and virtual computer environments through cloud computing; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Maintenance of computer software relating to computer security and prevention of computer risks; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical consulting in the field of artificial intelligence (AI) software customization; Updating of computer software relating to computer security and prevention of computer risks
Goods & Services
Recorded computer software using artificial intelligence for security, namely, software that provides security capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Goods & Services
Computer services, namely, integration of private and public cloud computing environments; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Design, development and implementation of software; Providing virtual computer systems and virtual computer environments through cloud computing
Goods & Services
"MONITOR"; Computer services, namely, integration of private and public cloud computing environments; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Design, development and implementation of software; Providing virtual computer systems and virtual computer environments through cloud computing
Goods & Services
"SECURE"; Computer services, namely, integration of private and public cloud computing environments; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of software as a service (SAAS); Design, development and implementation of software; Providing virtual computer systems and virtual computer environments through cloud computing
Goods & Services
Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for ensuring the security of electronic mail; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-computing software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorising access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable database management software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable industrial process control software; Downloadable middleware for software application integration; Recorded software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices
Goods & Services
Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable industrial process control software; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices
Goods & Services
Computer services, namely, integration of private and public cloud computing environments; Consulting services in the field of software as a service (SAAS); Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Design, development and implementation of software; Providing virtual computer systems and virtual computer environments through cloud computing

Goods & Services
Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for ensuring the security of electronic mail; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-computing software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable database management software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable industrial process control software; Downloadable middleware for software application integration; Recorded software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices; "INSPECT"

Goods & Services
"MONITOR"

Goods & Services
Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable software for ensuring the security of electronic mail; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for processing images, graphics and text; Downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable cloud-computing software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Downloadable computer software programs for spreadsheet management; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer operating software; Downloadable database management software for security, monitoring, troubleshooting and forensics for containers and microservices; Downloadable industrial process control software; Downloadable middleware for software application integration; Recorded software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; Recorded computer software for database management; Recorded computer software for use in database management; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices; "SECURE"

Goods & Services
"CLOUD"

Goods & Services
computer education training; providing education courses in the fields of computers, computer technology, computer networks, and computer network optimization, forensics, analysis, and troubleshooting; arranging and conducting educational conferences, classes, seminars, and workshops in the fields of computers, computer technology, computer networks, and computer network optimization, forensics, analysis, and troubleshooting and distribution of training material in connection therewith; educational services, namely, providing training of computer users and IT professional for certification in the fields of computers, computer technology, computer networks, and computer network optimization, forensics, analysis, and troubleshooting; IT training services; teaching and training in information technology

Goods & Services
educational services, namely, organizing and conducting seminars, classes, conferences, and workshops in the fields of computer programming, computer technologies, software, software development, cloud computing, computer networking and communications, computer network protocols, optimization and analysis of all the foregoing, and distribution of educational materials in connection therewith

Goods & Services
educational services, namely, organizing and conducting seminars, classes, conferences, and workshops in the fields of computer programming, computer technologies, software, software development, cloud computing, computer networking and communications, computer network protocols, optimization and analysis of all the foregoing, and distribution of educational materials in connection therewith




