The trademark application SYSDIG was filed by Sysdig, Inc., a U.S. corporation (the "Applicant"). Application under examination.
The application was filed in English (French was selected as the second language).
Change of name and address of the trademark registration was recorded on September 24, 2024.
Goods And Services
The mark was filed in class 9 with following description of goods:
Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network
Computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices
Computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices
Downloadable software for monitoring and controlling communication between computers and automated machine systems
Downloadable software for processing images, graphics and text
Downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices
Downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices
Downloadable computer software for administration of computer local area networks
Downloadable computer software for administration of computer networks
Downloadable computer software for application and database integration
Downloadable computer software for authorizing access to data bases
Downloadable computer software for database management
Downloadable computer software for document management
Downloadable computer software for encryption
Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports
Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information
Downloadable computer software for use in computer access control
Downloadable computer software for use in database management
Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files
Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files
Downloadable computer software for wireless content delivery
Downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit
Downloadable computer software programs for spreadsheet management
Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface
Downloadable computer software to automate data warehousing
Downloadable computer software to maintain and operate computer system
Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces
Downloadable computer operating software
Downloadable industrial process control software
Recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit
Recorded computer software for database management
Recorded computer software for use in database management
Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit
Recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices
Recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices
Recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices
Recorded computer software using artificial intelligence for security, namely, software that provides security capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments.
The mark was filed in class 42 with following description of goods:
Computer services, namely, integration of private and public cloud computing environments
Consulting services in the field of software as a service (SaaS)
Consulting services in the design and implementation of computer-based information systems for businesses
Consulting services in the field of cloud computing
Design, development and implementation of software
Providing virtual computer systems and virtual computer environments through cloud computing
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
Computer security consultancy in the field of security, monitoring, troubleshooting and forensics for cloud-based, container based, and host based application workloads and microservices
Design, development, and implementation of security software for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Maintenance of computer software relating to computer security and prevention of computer risks
Technical consulting in the field of artificial intelligence (AI) software customization
Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services
Updating of computer software relating to computer security and prevention of computer risks
Software as a Service (SaaS) services featuring software for security, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Software as a Service (SaaS) services featuring software for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Software as a Service (SaaS) services featuring software using artificial intelligence for security, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Software as a Service (SaaS) services, namely, hosting software for use by others for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
Providing temporary use of on-line non-downloadable software using artificial intelligence (AI) within security software for responding to customer queries about the customer's IT environment
Providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) within security software for responding to customer queries about the customer's IT environment.