CYBERARK CLOUD ENTITLEMENTS MANAGER
associated with 19 other trademarks
Downloadable computer software for managing access control settings for Information Technology infrastructure; downloadable computer software for the ...

Words that describe this trademark:

downloadable computer software  information technology infrastructure  software managing  access control  control settings  computer software  managing access  featuring  software  settings 

Serial Number:

90300108

Mark:

CYBERARK CLOUD ENTITLEMENTS MANAGER

Status:

Registered

Status Date:

06-07-2022

Filing Date:

Registration Number:

6749887

Registration Date:

06-07-2022

Goods and Services:

Downloadable computer software for managing access control settings for Information Technology infrastructure; downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable computer software for adaptive risk-based decision making; downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; downloadable computer software for implementing least privilege access across computer networks network and cloud environments; downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources; downloadable computer manuals for use in connection with downloadable computer software for managing access control settings for Information Technology infrastructure, downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity, downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, downloadable computer software for implementing least privilege access across computer networks network and cloud environments, downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, and downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources Software as a service (SAAS) services featuring software for managing access control settings for Information Technology infrastructure; software as a service (SAAS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making; software as a service (SAAS) services featuring software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; software as a service (SAAS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SAAS) services featuring software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; software as a service (SAAS) services featuring software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; software as a service (SAAS) services featuring software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; software as a service (SAAS) services featuring software for implementing least privilege access across computer networks network and cloud environments; software as a service (SAAS) services featuring software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; software as a service (SAAS) services featuring software for integrating with privileged access management solutions and for securing computer networks and cloud resources

Mark Description:

N/A

Class:

Scientific and technological services

Type of Mark:

Trademark

Published for Opposition Date:

03-22-2022

Mark Drawing Status:

Standart Character Mark

Abandon Date:

N/A

Business Name:

FOLEY HOAG LLP

Correspondent Name:

Recent Trademark filings by this company