EUTM file information

019064938

SentinelOne


August 6, 2024

Trademark Summary

The trademark application SentinelOne was filed by SentinelOne, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on October 17, 2024, and still open for oppositions.

The application was filed in English (German was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable software, namely a suite of cybersecurity software and tools
    2. Downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
    3. Downloadable computer software for computer security incident tracking
    4. Downloadable software for Internet of Things (IOT) device and end point discovery and management
    5. Downloadable software for connected device discovery and management
    6. Downloadable software for computer network mapping
    7. Downloadable software for managing the cyber security of environments combining computing devices and related networks
    8. Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks
    9. Downloadable software to search for and index electronic data relating to cybersecurity incidents and threats
    10. Downloadable software for ingesting, analyzing, and providing cybersecurity threat intelligence information
    11. Downloadable software for accessing third-party computer software and associated data
    12. Downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data
    13. Downloadable software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources
    14. Downloadable software with an artificial intelligence-driven chatbot
    15. Downloadable software for detecting, misdirecting, and attracting cybersecurity threats
    16. Downloadable software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data
    17. Downloadable software for ingestion, storage, analysis of computer security electronic data and information technology electronic data
    18. Downloadable software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation/certification
    19. Downloadable computer software platforms for cloud security
    20. Downloadable software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence.
  • The mark was filed in class 35 with following description of goods:
    1. Business consulting in the field of cybersecurity
    2. Business consultancy services relating to politics and cybersecurity
    3. Marketing services, namely, providing a website featuring information about third-party computer software solutions that are compatible with proprietary software and Software as a Service services.
  • The mark was filed in class 36 with following description of goods:
    1. Capital investment services in the field of technology companies
    2. Venture capital advisory services in the field of technology companies
    3. Venture capital financing in the field of technology companies.
  • The mark was filed in class 41 with following description of goods:
    1. Educational services, namely, providing speakers in the field of cybersecurity
    2. Providing a website featuring educational information and training in the field of cybersecurity
    3. Providing educational blogs and non-downloadable publications in the nature of articles, 6research papers, and newsletters in the fields of cybersecurity, computer security, computer network security, and computer network endpoint security via a website.
  • The mark was filed in class 42 with following description of goods:
    1. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring a suite of cybersecurity software and tools
    2. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
    3. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software for computer security incident tracking
    4. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for Internet of Things (IOT) device and end point discovery and management
    5. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for connected device discovery and management
    6. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for computer network mapping
    7. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for managing the cyber security of environments combining computing devices and related networks
    8. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks
    9. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software to search for and index electronic data relating to cybersecurity incidents and threats
    10. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for ingesting, analyzing, and providing cybersecurity threat intelligence information
    11. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for accessing third-party computer software and associated data
    12. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data
    13. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources
    14. Software development and design services, including in the field of cyber security and secure network operations
    15. IT consultancy services
    16. IT security, protection and restoration services
    17. Computer security services
    18. Maintenance and updating of computer software in the field of cyber and computer security
    19. Technical consulting in the field of cybersecurity
    20. Cybersecurity services in the nature of analyzing the computer networks, hardware, software, and business practices of others for security vulnerabilities, and proposing potential solutions
    21. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software with an artificial intelligence-driven chatbot
    22. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for detecting, misdirecting, and attracting cybersecurity threats
    23. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data
    24. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for ingestion, storage, analysis of computer security electronic data and information technology electronic data
    25. Computer security services, namely, cybersecurity threat hunting and detection services for others
    26. Providing a website featuring an online database of known cybersecurity threats
    27. Computer cybersecurity services provided to others, namely, managed detection and response services
    28. Technical support services, namely, troubleshooting cybersecurity software problems
    29. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation/certification
    30. Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
    31. Platform as a service (PAAS) featuring computer software platforms for cloud security
    32. Software development in the field of cloud security
    33. Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence.