CISCO HYPERSHIELD - Trademark Details
Status: 638 - New Application - Assigned To Examiner
Image for trademark with serial number 98789867
Serial Number
98789867
Word Mark
CISCO HYPERSHIELD
Status
638 - New Application - Assigned To Examiner
Status Date
2025-04-10
Filing Date
2024-10-08
Mark Drawing
4 - Standard character mark
Attorney Name
Law Office Assigned Location Code
M10
Employee Name
CLYBURN, DIONNE
Statements
Goods and Services
Computer hardware; downloadable software for application security; downloadable cybersecurity software; downloadable software for providing endpoint security; downloadable computer software for data security and data protection; downloadable software for application security testing; downloadable software using artificial intelligence for cybersecurity and monitoring; downloadable software using artificial intelligence for data security consulting; downloadable software using artificial intelligence for cybersecurity risk management; downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; downloadable software using artificial intelligence for use in machine learning, cloud and data security, data access, management and collection, cyber threat detection and prevention and data risk analysis; downloadable computer software for computer network management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; downloadable software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; downloadable software for controlling network security and access, and for implementing network security policies; downloadable software for data security for use in machine-to-machine and machine-to-people communications networks; downloadable software for adaptive risk-based decision making in the field of computer security; downloadable software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable software for computer security testing; downloadable software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; downloadable software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; downloadable software for industrial attack surface management; downloadable software for computer system and computer network vulnerability testing; downloadable software for computer system security analysis using digital twins; downloadable software for segmenting computer systems and networks; downloadable data analytics software for cybersecurity and computer system threat intelligence; downloadable software for computer system and network threat detection and response; downloadable software for simulating computer system and network security breaches and attacks.
Goods and Services
Providing temporary use of online non-downloadable software in the field of application security and data security; Providing temporary use of online non-downloadable software for endpoint security; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity and monitoring; providing temporary use of online non-downloadable software using artificial intelligence for data security consulting; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity risk management; providing temporary use of online non-downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring artificial intelligence software for cybersecurity and monitoring; software as a service (SaaS) featuring artificial intelligence software for data security consulting; software as a service (SaaS) featuring artificial intelligence software for cybersecurity risk management; software as a service (SaaS) featuring artificial intelligence software for monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring software for application security testing; software as a service (SaaS) services featuring software for computer networking management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; software as a service (SaaS) services featuring software for data security and data protection; software as a service (SaaS) services featuring software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; software as a service (SaaS) services featuring software for controlling network security and access, and for implementing network security policies; software as a service (SaaS) services featuring software for data security for use in machine-to-machine and machine-to-people communications networks; software as a service (SaaS) services featuring cybersecurity software; software as a service (SaaS) services featuring software for adaptive risk-based decision making in the field of computer security; software as a service (SaaS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; software as a service (SaaS) services featuring software for computer security testing; software as a service (SaaS) services featuring software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; software as a service (SaaS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SaaS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SaaS) services featuring software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; software as a service (SaaS) services featuring software for industrial attack surface management; software as a service (SaaS) services featuring software for computer system and computer network vulnerability testing; software as a service (SaaS) services featuring software for computer system security analysis using digital twins; software as a service (SaaS) services featuring software for segmenting computer systems and networks; software as a service (SaaS) services featuring data analytics software for cybersecurity and computer system threat intelligence; software as a service (SaaS) services featuring software for computer system and network threat detection and response; software as a service (SaaS) services featuring software for simulating computer system and network security breaches and attacks; computer security and computer network security consultancy; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to access information security vulnerabilities; computer security services, namely, restricting unauthorized access to computer networks; computer security threat analysis for protecting data and critical computer systems; computer security services in the nature of administering digital keys; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; monitoring of computer system operation by remote access; technical support services, namely, troubleshooting computer software problems, and services for the updating, maintenance, installation, repair, and customization of computer software; planning, design and implementation of computer technologies for others; computer virus protection services; Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of collecting and disseminating information from computer networks about cyber threats and malware; monitoring of computer systems for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; computer network and internet security services; research in the field of cybersecurity; providing information in the field of computer network and internet security; providing technical information in the field of computer software applications; providing technical information in the field of big data computer network security analytics.
Classification Information
International Class
009 - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus. - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
US Class Codes
021, 023, 026, 036, 038
Class Status Code
6 - Active
Class Status Date
2024-10-08
Primary Code
009
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2024-10-08
Primary Code
042
Current Trademark Owners
Party Type
10 - Original Applicant
Address
Please log in with your Justia account to see this address.
Correspondences
Name
Mark A. Jansen Fenwick & West LLP
Address
Please log in with your Justia account to see this address.
Foreign Application Information
Filing DateApplication NumberCountryForeign Priority Claim In
2024-04-1792134JamaicaFalse
2024-04-1792134JamaicaFalse
Trademark Events
Event DateEvent Description
2024-10-08NEW APPLICATION ENTERED
2025-04-09NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
2025-04-10ASSIGNED TO EXAMINER