CORTEX XSIAM
By: Palo Alto Networks, Inc.
Providing Non-downloadable Software For Autonomous Threat Detection, Collection, Monitoring, And Analysis Of Patterns For Identifying Cyber Threats To Network And Cloud Security; Providing Non-downloadable Cloud Computing Software Using Artificial Intelligence For Telemetry Monitoring, And Threat Detection, Intelligence, And Response; Providing Non-downloadable Software And Applications For Troubleshooting, Diagnosing, And Protecting Computer Software, Hardware, Networks, Virtual Machines, And Operational Technology; Providing Non-downloadable Software And Applications For Autonomous Management Of Security Operations And Incident Response; Providing Non-downloadable Software For Data Mining, Connecting With Internet Protocol Addresses, Identifying Internet Protocol Addresses, Securing Network Operations, And Identifying Network Security Risks; Providing Non-downloadable Software For Use In Monitoring Of Computer Systems All To, Namely, Allow Users To Aggregate, Model, And Analyze Data From Their Machines And Infrastructure For Security Purposes; Software As A Service (saas) Featuring Software Using Cloud-based Technology And Artificial Intelligence For Network Security, End Point Security And Cloud Security; Software As A Service (saas) Services Featuring Software For Providing Descriptive Analytics, Diagnostic Analytics, Predictive Analytics, Prescriptive Analytics And Analytics Against Data, Namely, Computer Systems Analysis, Computer Systems Security Analysis, Computer Network Security Analysis, Computer Network Management And Optimization, Information Technology Management And Optimization; Software As A Service (saas) Services Featuring Software For Use In Data Science, Asset Optimization, And Optimization Of Infrastructure Management And/or Information Security Processes For Information Technology Security, Governance, And Compliance, Namely, Testing, Analysis, Identification, Evaluation And Reporting On Computer Assets And Systems On The Internet Or In The Cloud Of Others To Facilitate Identification, Remediation, And Management Of Security Vulnerabilities; Monitoring Of Computer Systems For Security Purposes In The Nature Of Cybersecurity, Unauthorized Access, Data Breach, And Detection; Monitoring Data, Namely, Monitoring Of Computer Systems For Detecting Data Associated With The Configuration, Operation, And Behavior Of Networked Computing Systems; Computer Security And Information Technology Consultancy In The Field Of Data Collection, Attack Surface And Vulnerability Enumeration And Remediation, And Penetration Testing Of Computers And Networks To Assess Information Security Vulnerability And It Operations; Data Automation And Collection Service Using Proprietary Software To Evaluate, Analyze And Collect Service Data; All Excluding Licensing Of Intellectual Property Relating To Integrated Circuits, Microprocessors, And Microprocessor Cores.
Words that describe this logo
Providing Nondownloadable Software Autonomous Threat Detection CollectionTrademark Details
This Brand Name CORTEX XSIAM is applied by Palo Alto Networks, Inc.
This Trademark was applied on date 28 November 2022
This Application has been filed by their agent SAIKRISHNA & ASSOCIATES
Trademark | CORTEX XSIAM |
Application No | 5760860 |
Filing Dte | 28-11-2022 |
User Detail | Proposed to be used |
Certificate Number | 0 |
Valid Until | |
Goods and Service | Providing Non-downloadable Software For Autonomous Threat Detection, Collection, Monitoring, And Analysis Of Patterns For Identifying Cyber Threats To Network And Cloud Security; Providing Non-downloadable Cloud Computing Software Using Artificial Intelligence For Telemetry Monitoring, And Threat Detection, Intelligence, And Response; Providing Non-downloadable Software And Applications For Troubleshooting, Diagnosing, And Protecting Computer Software, Hardware, Networks, Virtual Machines, And Operational Technology; Providing Non-downloadable Software And Applications For Autonomous Management Of Security Operations And Incident Response; Providing Non-downloadable Software For Data Mining, Connecting With Internet Protocol Addresses, Identifying Internet Protocol Addresses, Securing Network Operations, And Identifying Network Security Risks; Providing Non-downloadable Software For Use In Monitoring Of Computer Systems All To, Namely, Allow Users To Aggregate, Model, And Analyze Data From Their Machines And Infrastructure For Security Purposes; Software As A Service (saas) Featuring Software Using Cloud-based Technology And Artificial Intelligence For Network Security, End Point Security And Cloud Security; Software As A Service (saas) Services Featuring Software For Providing Descriptive Analytics, Diagnostic Analytics, Predictive Analytics, Prescriptive Analytics And Analytics Against Data, Namely, Computer Systems Analysis, Computer Systems Security Analysis, Computer Network Security Analysis, Computer Network Management And Optimization, Information Technology Management And Optimization; Software As A Service (saas) Services Featuring Software For Use In Data Science, Asset Optimization, And Optimization Of Infrastructure Management And/or Information Security Processes For Information Technology Security, Governance, And Compliance, Namely, Testing, Analysis, Identification, Evaluation And Reporting On Computer Assets And Systems On The Internet Or In The Cloud Of Others To Facilitate Identification, Remediation, And Management Of Security Vulnerabilities; Monitoring Of Computer Systems For Security Purposes In The Nature Of Cybersecurity, Unauthorized Access, Data Breach, And Detection; Monitoring Data, Namely, Monitoring Of Computer Systems For Detecting Data Associated With The Configuration, Operation, And Behavior Of Networked Computing Systems; Computer Security And Information Technology Consultancy In The Field Of Data Collection, Attack Surface And Vulnerability Enumeration And Remediation, And Penetration Testing Of Computers And Networks To Assess Information Security Vulnerability And It Operations; Data Automation And Collection Service Using Proprietary Software To Evaluate, Analyze And Collect Service Data; All Excluding Licensing Of Intellectual Property Relating To Integrated Circuits, Microprocessors, And Microprocessor Cores. |
Business Name | Palo Alto Networks, Inc. |
Business Type | Private Limited Company |
Business Sector | Service |
What trademarKing.in Does
TrademarKing help you to register trademark in India. Every year many business use TrademarKing.in to register & protect their brands with smooth filing process. TrademarKing also monitors your Brand name if TrademarK Registration is done through TrademarKing.in. Now you can Register TrademarK Through TrademarKing.in.
In India we have filed 100000+ Trademark Registration , so start now! to register your trademark.
TrademarKing is a free trademark search engine developend by PCNR Trademarks Management Pvt Ltd, India.
Trademark Monitoring