LOOKOUT
Mark Identification

LOOKOUT

Serial Number

97541543

Filing Date

Aug 9, 2022

Trademark by

LOOKOUT INC.

Classification Information

Downloadable computer software for identifying and protecting data which is transmitted in electronic form or otherwise for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing data during access to a computer network; for securing connectivity to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection

Electrical and Scientific Apparatus

Providing online non-downloadable software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection. Software as a Service (SaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection; Connectivity as a Service (CaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection. Platform as a Service (PaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise; for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data; for securing connectivity to a computer network; for securing data during access to a computer network; for securing computing hardware and software located at the edge of a network; for blocking access to and from malicious websites and links; for secure remote access to a network; for on-premises or cloud-based security policy enforcement; for capturing, storing, presenting credentials for authentication to multiple computer services; for enterprise digital rights management; and for phishing and content protection. Hardware as a Service (HaaS), namely, providing a software-defined wide area network (SD-WAN) and software-defined web gateway. Computer consultancy services, namely, computer software consultancy, computer technology consultancy

Computer and Scientific