CORTEX XSIAM

Palo Alto Networks, Inc.

Application Filed: 2022-06-16
Trademark Application Details
Trademark Logo CORTEX XSIAM

Mark For: CORTEX XSIAM™ trademark registration is intended to cover the categories of providing non-downloadable software for autonomous threat detection, collection, monitoring, and analysis of patterns for identifying cyber threats to network and cloud security; providing non-downloadable cloud computing software using artificial intelligence for telemetry monitoring, and threat detection, intelligence, and response; providing non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing non-downloadable software and applications for autonomous management of security operations and incident response; providing non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; data automation and collection service using proprietary software to evaluate, analyze and collect service data.

Status

2022-06-20 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number97461376
Mark Literal ElementsCORTEX XSIAM
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeService Mark
Current LocationNEW APPLICATION PROCESSING 2022-06-20
Basis1(b)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseNo
Current UseNo
Intent To UseYes
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameJoshua L. Simmons
Attorney Docket Number46516-4

Timeline

2022-06-16Application Filed
2022-06-20Location: NEW APPLICATION PROCESSING
2022-06-20Status: Live/Pending
2022-06-20Status: New application will be assigned to an examining attorney approximately 6 months after filing date.
2022-06-20Transaction Date

Trademark Parties (Applicants & Owners)

Party: Palo Alto Networks, Inc.
Address3000 Tannery Way Santa Clara, CALIFORNIA UNITED STATES 95054
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

Documents

Application2022-06-16
Drawing2022-06-16

Attorney of Record

JOSHUA L. SIMMONS
KIRKLAND & ELLIS LLP
601 LEXINGTON AVENUE
NEW YORK, NY 10022

Good, Services, and Codes

International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Providing non-downloadable software for autonomous threat detection, collection, monitoring, and analysis of patterns for identifying cyber threats to network and cloud security; providing non-downloadable cloud computing software using artificial intelligence for telemetry monitoring, and threat detection, intelligence, and response; providing non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing non-downloadable software and applications for autonomous management of security operations and incident response; providing non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; data automation and collection service using proprietary software to evaluate, analyze and collect service data
GS0421Providing temporary use of non-downloadable software for autonomous threat detection, collection, monitoring, and analysis of patterns for identifying cyber threats to network and cloud security; providing temporary use of non-downloadable cloud computing software using artificial intelligence for telemetry monitoring, and threat detection, intelligence, and response; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for autonomous management of security operations and incident response; providing temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; software as a service (SAAS) services featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; monitoring of computer systems for cybersecurity purposes, namely, for detecting unauthorized access and data breach; monitoring of computer systems' operation utilizing data associated with the configuration and behavior of networked computing systems; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; data automation and collection service using proprietary software to evaluate, analyze and collect service data; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores

Trademark Filing History

DescriptionDateProceeding Number
NEW APPLICATION ENTERED IN TRAM2022-06-20

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed