CYBERARK CLOUD ENTITLEMENTS MANAGER

Serial Number 90300108
Registration 6749887
700

Registration Progress

Application Filed
Nov 5, 2020
Under Examination
Approved for Publication
Mar 22, 2022
Published for Opposition
Mar 22, 2022
Registered
Jun 7, 2022

Trademark Image

CYBERARK CLOUD ENTITLEMENTS MANAGER

Basic Information

Serial Number
90300108
Registration Number
6749887
Filing Date
November 5, 2020
Registration Date
June 7, 2022
Published for Opposition
March 22, 2022
Drawing Code
4000

Status Summary

Current Status
Active
Status Code
700
Status Date
Jun 7, 2022
Registration
Registered
Classes
009 042

Rights Holder

CyberArk Software, Ltd.

03
Address
9 Hapsagot St., Park Ofer 2
Petach-Tikva 4951041
IL

Ownership History

CyberArk Software, Ltd.

Original Applicant
03
Petach-Tikva IL

CyberArk Software, Ltd.

Owner at Publication
03
Petach-Tikva IL

CyberArk Software, Ltd.

Original Registrant
03
Petach-Tikva IL

Legal Representation

Attorney
Joshua Jarvis, Esq.

USPTO Deadlines

Next Deadline
1045 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2022-06-07)
Due Date
June 07, 2028
Grace Period Ends
December 07, 2028
Additional deadlines exist. Contact your attorney for complete deadline information.

Application History

28 events
Date Code Type Description Documents
Jun 7, 2022 R.PR A REGISTERED-PRINCIPAL REGISTER Loading...
Jun 7, 2022 NRCC E NOTICE OF REGISTRATION CONFIRMATION EMAILED Loading...
Mar 22, 2022 PUBO A PUBLISHED FOR OPPOSITION Loading...
Mar 22, 2022 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Loading...
Mar 2, 2022 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Loading...
Feb 17, 2022 CNSA O APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
Jan 25, 2022 ERFR I TEAS REQUEST FOR RECONSIDERATION RECEIVED Loading...
Jan 25, 2022 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Jan 25, 2022 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Jan 7, 2022 CNFR R FINAL REFUSAL WRITTEN Loading...
Jan 7, 2022 GNFR O FINAL REFUSAL E-MAILED Loading...
Jan 7, 2022 GNFN O NOTIFICATION OF FINAL REFUSAL EMAILED Loading...
Nov 4, 2021 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Nov 4, 2021 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Nov 3, 2021 ALIE A ASSIGNED TO LIE Loading...
Nov 1, 2021 ERSI I TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED Loading...
Aug 13, 2021 CNSL R SUSPENSION LETTER WRITTEN Loading...
Aug 13, 2021 GNSL S LETTER OF SUSPENSION E-MAILED Loading...
Aug 13, 2021 GNS3 O NOTIFICATION OF LETTER OF SUSPENSION E-MAILED Loading...
Jul 12, 2021 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Jul 12, 2021 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Jul 12, 2021 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Apr 26, 2021 CNRT R NON-FINAL ACTION WRITTEN Loading...
Apr 26, 2021 GNRT F NON-FINAL ACTION E-MAILED Loading...
Apr 26, 2021 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Apr 13, 2021 DOCK D ASSIGNED TO EXAMINER Loading...
Jan 5, 2021 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Nov 9, 2020 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 009
Downloadable computer software for managing access control settings for Information Technology infrastructure; downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable computer software for adaptive risk-based decision making; downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; downloadable computer software for implementing least privilege access across computer networks network and cloud environments; downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources; downloadable computer manuals for use in connection with downloadable computer software for managing access control settings for Information Technology infrastructure, downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity, downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, downloadable computer software for implementing least privilege access across computer networks network and cloud environments, downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, and downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources
First Use Anywhere: 0
First Use in Commerce: 0
Class 042
Software as a service (SAAS) services featuring software for managing access control settings for Information Technology infrastructure; software as a service (SAAS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making; software as a service (SAAS) services featuring software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; software as a service (SAAS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SAAS) services featuring software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; software as a service (SAAS) services featuring software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; software as a service (SAAS) services featuring software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; software as a service (SAAS) services featuring software for implementing least privilege access across computer networks network and cloud environments; software as a service (SAAS) services featuring software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; software as a service (SAAS) services featuring software for integrating with privileged access management solutions and for securing computer networks and cloud resources
First Use Anywhere: 0
First Use in Commerce: 0

Classification

International Classes
009 042

Disclaimers

The following terms have been disclaimed and are not claimed as part of the trademark:
General Disclaimer
"CLOUD ENTITLEMENTS MANAGER"