LUMU
Mark Identification

LUMU

Serial Number

99658054

Filing Date

Feb 18, 2026

Trademark by

LUMU TECHNOLOGIES INC.

Classification Information

Downloadable computer software for cybersecurity operations; Downloadable computer software for real-time network threat detection, analysis, and response; Downloadable computer software for conducting real-time detection, analysis, and response to cybersecurity incidents; Downloadable computer software for monitoring, muting, closing, and escalating cybersecurity incidents in real time; Downloadable computer software for monitoring cybersecurity risks in real time; Downloadable computer software for detecting computer attacks, compromises, vulnerabilities, suspicious activities, and normal activities; Downloadable computer software for cybersecurity automation; Downloadable computer software for cybersecurity automation, namely, automated threat detection and response; Downloadable computer software for network log archiving; Downloadable computer software for storing and analyzing network logs; Downloadable computer software for maintaining a historical database of network activities; Downloadable computer software for network log archiving, namely, software for analyzing network data to develop threat intelligence; Downloadable computer software for determining cybersecurity threat levels; Downloadable computer software for tracking, collecting, analyzing and processing network data to identify cybersecurity compromise levels; Downloadable computer software for preventing ransomware attacks; Downloadable computer software for identifying and patching exposed network infrastructure; Downloadable computer software for detecting and mitigating phishing attempts; Downloadable computer software platforms for cybersecurity operations; Downloadable computer software platforms for cybersecurity operations, namely, incident management, threat intelligence, data compliance and forensics, and attack surface analysis

Electrical and Scientific Apparatus

Software as a service (SAAS) services featuring software for cybersecurity operations; Software as a service (SAAS) services featuring software for real-time network threat detection, analysis, and response; Software as a service (SAAS) services featuring software for conducting real-time detection, analysis, and response to cybersecurity incidents; Software as a service (SAAS) services featuring software for monitoring, muting, closing, and escalating cybersecurity incidents in real time; Software as a service (SAAS) services featuring software for monitoring cybersecurity risks in real time; Software as a service (SAAS) services featuring software for detecting computer attacks, compromises, vulnerabilities, suspicious activities, and normal activities; Software as a service (SAAS) services featuring software for cybersecurity automation; Software as a service (SAAS) services featuring software for cybersecurity automation, namely, automated threat detection and response; Software as a service (SAAS) services featuring software for network log archiving; Software as a service (SAAS) services featuring software for storing and analyzing network logs; Software as a service (SAAS) services featuring software for maintaining a historical database of network activities; Software as a service (SAAS) services featuring software for network log archiving, namely, software for analyzing network data to develop threat intelligence; Software as a service (SAAS) services featuring software for determining cybersecurity threat levels; Software as a service (SAAS) services featuring software for tracking, collecting, analyzing and processing network data to identify cybersecurity compromise levels; Software as a service (SAAS) services featuring software for preventing ransomware attacks; Software as a service (SAAS) services featuring software for identifying and patching exposed network infrastructure; Software as a service (SAAS) services featuring software for detecting and mitigating phishing attempts; Platform as a service (PAAS) featuring computer software platforms for cybersecurity operations; Platform as a service (PAAS) featuring computer software platforms for cybersecurity operations, namely, incident management, threat intelligence, data compliance and forensics, and attack surface analysis

Computer and Scientific