DATAHAWK
Mark Identification

DATAHAWK

Serial Number

97725219

Filing Date

Dec 20, 2022

Registration Date

Jan 16, 2024

Trademark by

COHESITY INC.

Active Trademark

Classification Information

Software as a service (SaaS) services featuring computer security, data protection and data security software; providing online non-downloadable software for computer security, data protection and data security; software as a service (SaaS) services featuring software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise; providing online non-downloadable software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise; software as a service (SaaS) services featuring software for recovery of lost, deleted or compromised data; providing online non-downloadable software for recovery of lost, deleted or compromised data; software as a service (SaaS) services featuring software for computer disaster recovery; Providing online non-downloadable software for computer disaster recovery; software as a service (SaaS) services featuring software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise; Providing online non-downloadable software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise; computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise; software as a service (SaaS) services featuring customizable computer security software for others in the field of cybersecurity; providing online non-downloadable software featuring customizable computer security software for others in the field of cybersecurity; backup services for computer hard drives, flash drives, and cloud-based storage for recovering and restoring computer data; software as a service (SaaS) services featuring software for backup and recovery of digital and electronic data; providing online non-downloadable software for backup and recovery of digital and electronic data; computer security analysis services, namely, analysis of secondary copies of data for detecting malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise; storage services, namely, cloud-based electronic data storage; computer security monitoring services, namely, monitoring of computer systems for detecting malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise; computer forensic services; providing online non-downloadable cloud-based software for data classification and data forensics in the field of cybersecurity; Computer services, namely, implementation of on-premise AI/ML-based software for data classification and data forensics in the field of cybersecurity; managed cybersecurity services, namely, intrusion detection, intrusion prevention, cybersecurity threat detection and prevention, namely, online scanning, detecting, and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise for cybersecurity purposes; none of the aforementioned services used in relation to advertising, marketing, promotion or e-commerce services for others or for searchable computer database software or data center services

Computer and Scientific