CROWDSTRIKE Trademark
CROWDSTRIKE is a USPTO trademark filed by Crowdstrike, Inc.. Status: Registered.
Trademark Facts
| Mark | CROWDSTRIKE |
|---|---|
| Serial Number | 90188699 |
| Registration Number | 6415232 |
| Status | Registered |
| Filing Date | 2020-09-17 |
| Registration Date | 2021-07-13 |
| Mark Type | Combined |
| Nice Classes | 041 (Education & Entertainment), 042 (Software & IT) |
| Owner | Crowdstrike, Inc. |
| Attorney of Record | Carrie Bader |
| Prosecution Events | 33 |
| Latest Event | TCCA on 2026-02-16 |
Goods & Services
educational services, namely, providing online and onsite courses in the fields of cybersecurity, endpoint protection and response technology, cyber threat intelligence, and the detection and prevention of security breaches; computer security consulting; consulting in the field of information technology; consultation for protecting data and information from unauthorized access in the field of computer and network security, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints