LUMU Trademark
LUMU is a USPTO trademark filed by Lumu Technologies, Inc.. Status: Pending.
Trademark Facts
| Mark | LUMU |
|---|---|
| Serial Number | 99658056 |
| Status | Pending |
| Filing Date | 2026-02-18 |
| Mark Type | Combined |
| Nice Classes | 009 (Electronics & Software), 042 (Software & IT) |
| Owner | Lumu Technologies, Inc. |
| Attorney of Record | Adam Thompson |
| Prosecution Events | 2 |
| Latest Event | MAFR on 2026-02-18 |
Goods & Services
Class 009: Downloadable computer software for cybersecurity operations; Downloadable computer software for real-time network threat detection, analysis, and response; Downloadable computer software for conducting real-time detection, analysis, and response to cybersecurity incidents; Downloadable computer software for monitoring, muting, closing, and escalating cybersecurity incidents in real time; Downloadable computer software for monitoring cybersecurity risks in real time; Downloadable computer software for detecting computer attacks, compromises, vulnerabilities, suspicious activities, and normal activities; Downloadable computer software for cybersecurity automation; Downloadable computer software for cybersecurity automation, namely, automated threat detection and response; Downloadable computer software for network log archiving; Downloadable computer software for storing and analyzing network logs; Downloadable computer software for maintaining a historical database of network activities; Downloadable computer software for network log archiving, namely, software for analyzing network data to develop threat intelligence; Downloadable computer software for determining cybersecurity threat levels; Downloadable computer software for tracking, collecting, analyzing and processing network data to identify cybersecurity compromise levels; Downloadable computer software for preventing ransomware attacks; Downloadable computer software for identifying and patching exposed network infrastructure; Downloadable computer software for detecting and mitigating phishing attempts; Downloadable computer software platforms for cybersecurity operations; Downloadable computer software platforms for cybersecurity operations, namely, incident management, threat intelligence, data compliance and forensics, and attack surface analysis; Class 042: Software as a service (SAAS) services featuring software for cybersecurity operations; Software as a service (SAAS) services featuring software for real-time network threat detection, analysis, and response; Software as a service (SAAS) services featuring software for conducting real-time detection, analysis, and response to cybersecurity incidents; Software as a service (SAAS) services featuring software for monitoring, muting, closing, and escalating cybersecurity incidents in real time; Software as a service (SAAS) services featuring software for monitoring cybersecurity risks in real time; Software as a service (SAAS) services featuring software for detecting computer attacks, compromises, vulnerabilities, suspicious activities, and normal activities; Software as a service (SAAS) services featuring software for cybersecurity automation; Software as a service (SAAS) services featuring software for cybersecurity automation, namely, automated threat detection and response; Software as a service (SAAS) services featuring software for network log archiving; Software as a service (SAAS) services featuring software for storing and analyzing network logs; Software as a service (SAAS) services featuring software for maintaining a historical database of network activities; Software as a service (SAAS) services featuring software for network log archiving, namely, software for analyzing network data to develop threat intelligence; Software as a service (SAAS) services featuring software for determining cybersecurity threat levels; Software as a service (SAAS) services featuring software for tracking, collecting, analyzing and processing network data to identify cybersecurity compromise levels; Software as a service (SAAS) services featuring software for preventing ransomware attacks; Software as a service (SAAS) services featuring software for identifying and patching exposed network infrastructure; Software as a service (SAAS) services featuring software for detecting and mitigating phishing attempts; Platform as a service (PAAS) featuring computer software platforms for cybersecurity operations; Platform as a service (PAAS) featuring computer software platforms for cybersecurity operations, namely, incident management, threat intelligence, data compliance and forensics, and attack surface analysis