Trademarkia Logo

Canada

C$
SentinelOne & DESIGN
SEARCHED

on 21 Mar 2025

Last Applicant/ Owned by

SentinelOne, Inc.

444 Castro Street, Ste 400Mountain View, CA 94041

US

Serial Number

2341171 filed on 30th Jul 2024

Correspondent Address

MLT AIKINS LLP

2100 Livingston Place222-3rd Avenue SWCalgary

ALBERTA

CA

T2P0B4

SentinelOne & DESIGN

Trademark usage description

downloadable software, namely a suite of cybersecurity software and tools; downloadable computer network security software for managing computer netwo Read More

Vienna Information


26 . 3 . 23

Lines or bands forming an angle -- Note: Including chevrons and arrowheads formed by lines or bands.Lignes ou bandes formant un angle -- Note: Y compris les chevrons et les pointes de flèches formées par des lignes ou des bandes.

26 . 4 . 4

Other irregular parallelograms, trapezia and quadrilaterals, quadrilaterals containing one or more rounded cornersAutres parallélogrammes, trapèzes et quadrilatères irréguliers, quadrilatères avec un ou plusieurs coins arrondis

26 . 4 . 5

One quadrilateralUn quadrilatère

26 . 4 . 24

Quadrilaterals with dark surfaces or parts of surfacesQuadrilatères avec surface ou partie de la surface foncée

26 . 5 . 1

One polygonUn polygone

26 . 5 . 11

Polygons containing one or more quadrilateralsPolygones contenant un ou plusieurs quadrilatères

26 . 5 . 12

Polygons containing one or more other geometrical figures Note: Including polygons containing bent or straight lines (except 26.5.10)Polygones contenant une ou plusieurs autres figures géométriques Note: Y compris les polygones contenant des lignes courbées ou droites (excepté 26.5.10)

26 . 5 . 26

Polygons with cutout areasPolygones avec des zones découpées

26 . 11 . 1

One line or one bandUne ligne ou une bande

26 . 11 . 6

Thick lines, bandsLignes épaisses, bandes

26 . 11 . 9

Oblique lines or bandsLignes ou bandes obliques

26 . 11 . 10

Straight lines or bandsLignes ou bandes droites

27 . 1 . 1

Letters or numerals forming geometrical figures, written or typographical matter in perspectiveLettres ou chiffres formant des figures géométriques, inscriptions en perspective

27 . 1 . 4

Letters or numerals forming any other polygon (surface or periphery)Lettres ou chiffres formant un autre polygone (surface ou pourtour)

27 . 5 . 1

Letters presenting a special form of writingLettres présentant un graphisme spécial

27 . 5 . 8

Letters linked to or containing a figurative element -- Note: Letters representing a human being or a part of the human body, an animal or a part of an animal's body, a plant, a heavenly body, a natural phenomenon or an object are classified in division 27.3.Lettres liées à un élément figuratif ou contenant un élément figuratif -- Note: Les lettres représentant un être humain ou une partie du corps humain, un animal ou une partie du corps d'un animal, un végétal, un corps céleste, un phénomène naturel ou un objet sont classées dans la division 27.3.

Classification Information


Class [009]
Downloadable software, namely a suite of cybersecurity software and tools; Downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral based predictive execution modeling; Downloadable computer software for computer security incident tracking; Downloadable software for Internet of Things (IOT) device and end point discovery and management; Downloadable software for connected device discovery and management; Downloadable software for computer network mapping; Downloadable software for managing the cyber security of environments combining computing devices and related networks; Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Downloadable software for managing the cyber security of environments combining computing devices and related networks; Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Downloadable software to search for and index electronic data relating to cybersecurity incidents and threats; Downloadable software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Downloadable software for accessing third-party computer software and associated data; Downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Downloadable software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Downloadable software with an artificial intelligence driven chatbot; Downloadable software for detecting, misdirecting, and attracting cybersecurity threats; Downloadable software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Downloadable software for ingestion, storage, analysis of computer security electronic data and information technology electronic data; Downloadable software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation/certification; Downloadable computer software platforms for cloud security; Downloadable software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence.


Classification kind code

12

Class [035]
Business consulting in the field of cybersecurity; political consulting in the field of cybersecurity; marketing services, namely, providing a website featuring information about third-party computer software I solutions that are compatible with proprietary software and Software as a Service services.


Classification kind code

12

Class [036]
Capital investment services in the field of technology companies; Venture capital advisory services in the field of technology companies; Venture capital financing in the field of technology companies.


Classification kind code

12

Class [041]
Educational services, namely, providing speakers in the field of cybersecurity; providing a website featuring educational information and training in the field of cybersecurity; Providing educational blogs and non-downloadable publications in the nature of articles, 6research papers, and newsletters in the fields of cybersecurity, computer security, computer network security, and computer network endpoint security via a website.


Classification kind code

12

Class [042]
Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring a suite of cybersecurity software and tools; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral based predictive execution modeling; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring computer software for computer security incident tracking; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for Internet of Things (IOT) device and end point discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for connected device discovery and management; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for computer network mapping; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for managing the cyber security of environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for managing the cyber security of environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software to search for and index electronic data relating to cybersecurity incidents and threats; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for ingesting, analyzing, and providing cybersecurity threat intelligence information; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for accessing third-party computer software and associated data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Software development and design services, including in the field of cyber security and secure network operations; IT consultancy services; IT security, protection and restoration services; computer security services; maintenance and updating of computer software in the field of cyber and computer security; technical consulting in the field of cybersecurity; cybersecurity services in the nature of analyzing the computer networks, hardware, software, and business practices of others for security vulnerabilities, and proposing potential solutions; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software with an artificial intelligence-driven chatbot; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for detecting, misdirecting, and attracting cybersecurity threats; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software that uses artificial intelligence to detect cybersecurity threats to cloud-based electronic data; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for ingestion, storage, analysis of computer security electronic data and information technology electronic data; computer security services, namely, cybersecurity threat hunting and detection services for others; providing a website featuring an online database of known cybersecurity threats; computer cybersecurity services provided to others, namely, managed detection and response services; technical support services, namely, troubleshooting cybersecurity software problems; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation/certification; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for cloud security; Software development in the field of cloud security; Platform as a Service (PaaS) services and Software as a service (SAAS) services featuring software for automation of security operations activities, incident response, investigation, threat and vulnerability management, event workflow response, remediation and orchestration and threat intelligence.


Classification kind code

12

Mark Details


Serial Number

2341171

Mark Type

Trademark

Legal History


Action TakenStatus
Submitted for opposition 22
on 21st Mar 2025
Search Recorded
Submitted for opposition 20
on 21st Mar 2025
Examiner's First Report
Submitted for opposition 287
on 29th Aug 2024
Pre-Assessment Letter Sent
Submitted for opposition 30
on 30th Jul 2024
Filed
Submitted for opposition 1
on 30th Jul 2024
Created
Submitted for opposition 31
on 30th Jul 2024
Formalized