Serial Number:
90300108
Mark:
CYBERARK CLOUD ENTITLEMENTS MANAGER
Status:
Registered
Status Date:
06-07-2022
Filing Date:
Registration Number:
6749887
Registration Date:
06-07-2022
Downloadable computer software for managing access control settings for Information Technology infrastructure; downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable computer software for adaptive risk-based decision making; downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; downloadable computer software for implementing least privilege access across computer networks network and cloud environments; downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources; downloadable computer manuals for use in connection with downloadable computer software for managing access control settings for Information Technology infrastructure, downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity, downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, downloadable computer software for implementing least privilege access across computer networks network and cloud environments, downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, and downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources Software as a service (SAAS) services featuring software for managing access control settings for Information Technology infrastructure; software as a service (SAAS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making; software as a service (SAAS) services featuring software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; software as a service (SAAS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SAAS) services featuring software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; software as a service (SAAS) services featuring software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; software as a service (SAAS) services featuring software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; software as a service (SAAS) services featuring software for implementing least privilege access across computer networks network and cloud environments; software as a service (SAAS) services featuring software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; software as a service (SAAS) services featuring software for integrating with privileged access management solutions and for securing computer networks and cloud resources
Mark Description:
N/A
Class:
Scientific and technological services
Type of Mark:
Trademark
Published for Opposition Date:
03-22-2022
Owner:
Mark Drawing Status:
Standart Character Mark
Abandon Date:
N/A
Business Name:
FOLEY HOAG LLP
Correspondent Name: