ARM YOUR ENDPOINTS
Mark Identification

ARM YOUR ENDPOINTS

Serial Number

86336708

Filing Date

Jul 14, 2014

Registration Date

May 24, 2016

Trademark by

CARBON BLACK INC.

Classification Information

Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, laptops, mobile devices, tablet computers, and fixed function devices, in the nature of endpoints; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, laptops, mobile devices, tablet computers and fixed function devices, in the nature of endpoints; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, laptops, mobile devices, tablet computers and fixed function devices, in the nature of endpoints; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, laptops, mobile devices, tablet computers and fixed function devices, in the nature of endpoints; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, and laptops, mobile devices, tablet computers and fixed function devices, in the nature of endpoints; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, laptops, mobile devices, tablet computers and fixed function devices, in the nature of endpoints, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis

Computer and Scientific

Computer security services, namely, monitoring of computer systems for security purposes

Personal