EON Trademark
Serial Number: 98486386
Trademark Classes
Owner Contact Info
Legal Representation
Correspondence Address
Amy Cohen Heller Law Office of Amy Cohen Heller, LLC
P.O. Box 1065
Deerfield, IL 60015
United States
Trademark Details
Filing Date
April 5, 2024
Registration Date
Not Registered
Goods & Services
Downloadable computer software for cybersecurity analytics and for data analytics; Downloadable computer software for performing computer security information and event management (SIEM) operations; Downloadable computer software, namely downloadable security orchestration, automation and response (SOAR) software; Downloadable computer software for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Downloadable computer software for advanced analytics to identify and monitor network access risks; Downloadable computer software for performing operations of big data ingestion; Downloadable computer software for creating and operating data lakes; downloadable cloud computing software for managing cybersecurity risks in the fields of cyber threats, network vulnerabilities, data privacy; Downloadable computer software, namely downloadable computer software applications for providing business analytics; Downloadable computer software platforms for security information and event management (SIEM); Downloadable computer software using artificial intelligence for cybersecurity analytics and for data analytics; Downloadable computer software using artificial intelligence for coordinating computer security information event management (SIEM) operations; Downloadable computer software using artificial intelligence, namely downloadable security orchestration, automation and response (SOAR) software; Downloadable computer software using artificial intelligence for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Downloadable computer software and downloadable software applications using artificial intelligence for providing operational intelligence in the field of business analytics, for providing information in the field of cybersecurity and for troubleshooting cybersecurity operations based on data
Providing temporary use of non-downloadable computer software for cybersecurity analytics and for data analytics; Providing temporary use of non-downloadable computer software for performing computer security information and event management (SIEM) operations; Providing temporary use of non-downloadable computer software for security orchestration, automation and response (SOAR); Providing temporary use of non-downloadable computer software for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Providing temporary use of non-downloadable computer software for advanced analytics to identify and monitor network access risks; Providing temporary use of non-downloadable computer software for performing operations of big data ingestion; Providing temporary use of non-downloadable computer software for creating and operating data lakes; Software as a service (SAAS) services featuring cloud computing software for managing cybersecurity risks in the fields of cyber threats, network vulnerabilities, data privacy; Providing temporary use of non-downloadable software for providing business analytics; Platform as a service (PAAS) featuring computer software platforms for security information and event management (SIEM); Providing temporary use of on-line non-downloadable software and non-downloadable software applications using artificial intelligence for providing business analytics; Providing temporary use of non-downloadable computer software using artificial intelligence for security information and event management (SIEM); Providing temporary use of non-downloadable computer software using artificial intelligence for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Providing temporary use of non-downloadable software and applications using artificial intelligence for providing operational intelligence in the field of business analytics, for providing information in the field of cybersecurity and for troubleshooting cybersecurity operations based on data