Serial Number

97541547

Filing Date

Aug 9, 2022

Trademark by

LOOKOUT INC.

Classification Information

Downloadable computer software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing data during access to a computer network; for securing connectivity to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection

Electrical and Scientific Apparatus

Providing online non-downloadable software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection. Software as a Service (SaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection. Connectivity as a Service (CaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection. Platform as a Service (PaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection; Hardware as a Service (HaaS), namely, providing a software-defined wide area network (SD-WAN) and software-defined web gateway. Computer consultancy services, namely, computer software consultancy, computer technology consultancy

Computer and Scientific