FEARLESSLY FORWARD
DEAD

Serial Number

88712700

Owner

CYBERARK SOFTWARE LTD.

Attorney

Joshua Jarvis, Esq.

Filing Date

Dec 3, 2019

Add to watchlist:

No watchlists yet
View on USPTO

FEARLESSLY FORWARD Trademark

Serial Number: 88712700

FEARLESSLY FORWARD is a trademark filed by CYBERARK SOFTWARE LTD. on December 3, 2019. The trademark is classified under Class 9 (Computers & Electronics), Class 42 (Computer & Scientific). The application is currently no longer active.

Owner Contact Info

CYBERARK SOFTWARE LTD. (35 trademarks)

PETACH-TIKVA 4951010 , IL

Entity Type: 03

Trademark Details

Filing Date

December 3, 2019

Registration Date

Not Registered

Goods & Services

Downloadable computer software for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyber-related threats; downloadable computer software for transparently removing local administrative rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; downloadable computer software for protecting, securing, managing and auditing, credentials and secrets used by computer applications, automation scripts tools and other machine and non-human identities to securely access databases, web-services and other resources required to perform computing functions and deliver services, including all widely used non-human identities and application types including third party off-the-shelf software, internally developed application software, automation scripts, containerized, cloud, SaaS, PaaS, hybrid, mainframe and other software components, solutions, and compute environments; downloadable computer software for enabling secure application access over computer networks and over the internet, for protecting user identity using multi factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access, providing biometric user authentication services using biometric hardware and software technology, and for third party accounts management and related session activity monitoring; and downloadable electronic computer manuals distributed with the foregoing

Design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyber-related threats; design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for transparently removing local administrative rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; design, development, implementation of and consulting on computer software for protecting, securing, managing and auditing, credentials and secrets used by computer applications, automation scripts tools and other machine and non-human identities to securely access databases, web-services and other resources required to perform computing functions and deliver services, including all widely used non-human identities and application types including third party off-the-shelf software, internally developed application software, automation scripts, containerized, cloud, SaaS, PaaS, hybrid, mainframe and other software components, solutions, and compute environments; and design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for enabling secure application access over computer networks and over the internet, for protecting user identity using multi factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access, providing user authentication services using biometric hardware and software technology, and for third party accounts management and related session activity monitoring

Filing History

ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND
Mar 22, 2021 MAB2
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Mar 22, 2021 ABN2
NOTIFICATION OF INQUIRY AS TO SUSPENSION E-MAILED
Sep 8, 2020 GNS2
INQUIRY TO SUSPENSION E-MAILED
Sep 8, 2020 GNSI
SUSPENSION INQUIRY WRITTEN
Sep 8, 2020 CNSI
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED
Mar 5, 2020 GNS3
LETTER OF SUSPENSION E-MAILED
Mar 5, 2020 GNSL
SUSPENSION LETTER WRITTEN
Mar 5, 2020 CNSL
ASSIGNED TO EXAMINER
Mar 5, 2020 DOCK
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Dec 7, 2019 NWOS
NEW APPLICATION ENTERED
Dec 6, 2019 NWAP