XM CYBER LTD. logo

XM CYBER LTD.

10 Marks
Other
First Filed:Dec 1, 2016Latest Filed:Jan 6, 2026Address:11 GALGALEI HAPLADA ST., HERZLIYA, 4672211, IL

Portfolio Overview

Registered
5(50%)
Pending
2(20%)
Dead
3(30%)

Top Classes

Class 42
Software, IT Services & Scientific Research
8(80%)
Class 9
Electronics, Software & Scientific Equipment
5(50%)

TTAB Proceedings

No litigation activity

Top Firms

Rothwell, Figg, Ernst & Manb...(Sep 2024)
6

Trademark Portfolio

10 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
POSTUREDNA
POSTUREDNA
Service Mark
Unknown
PENDING
Owner:
Serial:79443320
Filed:Jan 6, 2026
Classes:42
Goods & Services
Class 042: Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability.
SPBOM
SPBOM
Service Mark
Unknown
PENDING
Owner:
Serial:79443222
Filed:Jan 6, 2026
Classes:42
Goods & Services
Class 042: Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability.
XM ATTACK GRAPH ANALYSIS
XM ATTACK GRAPH ANALYSIS
Service Mark
Word
REGISTERED
Owner:
Serial:79407378
Filed:Sep 18, 2024
Classes:42
Registration:7954116
Registered:Sep 23, 2025
Goods & Services
ATTACK GRAPH ANALYSIS; Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability.
79387637
79387637
Trademark
Design
REGISTERED
Owner:
Serial:79387637
Filed:Dec 4, 2023
Classes:9, 42
Registration:7602559
Registered:Dec 17, 2024
Goods & Services
Downloadable software for monitoring computer security; downloadable computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; downloadable computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; recorded software for monitoring computer security; recorded computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; recorded computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
XM CYBER
XM CYBER
Trademark
Word
REGISTERED
Owner:
Serial:79387430
Filed:Dec 4, 2023
Classes:9, 42
Registration:7628929
Registered:Dec 31, 2024
Goods & Services
Downloadable software for monitoring computer security; downloadable computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; downloadable computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; recorded software for monitoring computer security; recorded computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; recorded computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; "CYBER"; Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
SEE ALL WAYS
SEE ALL WAYS
Service Mark
Word
REGISTERED
Owner:
Serial:97220416
Filed:Jan 14, 2022
Classes:42
Registration:7328410
Registered:Mar 12, 2024
Goods & Services
Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based software for protecting computer security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
79205246
79205246
Trademark
Design
CANCELLED
Owner:
Serial:79205246
Filed:Jan 5, 2017
Classes:9, 42
Registration:5288398
Registered:Sep 19, 2017
Goods & Services
Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
XM
XM
Trademark
Word
REGISTERED
Owner:
Serial:79205247
Filed:Jan 5, 2017
Classes:42
Registration:5288399
Registered:Sep 19, 2017
Goods & Services
Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment | Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
DEFENSE BY OFFENSE
DEFENSE BY OFFENSE
Trademark
Word
CANCELLED
Owner:
Serial:87278310
Filed:Dec 22, 2016
Classes:9
Registration:5397722
Registered:Feb 6, 2018
HAXM
HAXM
Trademark
Word
CANCELLED
Owner:
Serial:79205086
Filed:Dec 1, 2016
Classes:9
Registration:5263127
Registered:Aug 15, 2017

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.