CISCO HYPERSHIELD Trademark

Trademark Overview


On Tuesday, October 8, 2024, a trademark application was filed for CISCO HYPERSHIELD with the United States Patent and Trademark Office. The USPTO has given the CISCO HYPERSHIELD trademark a serial number of 98789867. The federal status of this trademark filing is NEW APPLICATION - ASSIGNED TO EXAMINER as of Thursday, April 10, 2025. This trademark is owned by Cisco Technology, Inc.. The CISCO HYPERSHIELD trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Computer hardware; downloadable software for application security; downloadable cybersecurity software; downloadable software for providing endpoint security; downloadable computer software for data security and data protection; downloadable software for application security testing; downloadable software using artificial intelligence for cybersecurity and monitoring; downloadable software using artificial intelligence for data security consulting; downloadable software using artificial intelligence for cybersecurity risk management; downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; downloadable software using artificial intelligence for use in machine learning, cloud and data security, data access, management and collection, cyber threat detection and prevention and data risk analysis; downloadable computer software for computer network management and security, namely, software for traffic prioritizatio...

Providing temporary use of online non-downloadable software in the field of application security and data security; Providing temporary use of online non-downloadable software for endpoint security; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity and monitoring; providing temporary use of online non-downloadable software using artificial intelligence for data security consulting; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity risk management; providing temporary use of online non-downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring artificial intelligence software for cybersecurity and monitoring; software as a service (SaaS) featuring artificial intelligence software for data security consulting; software as a service (SaaS) featuring artificial int...
cisco hypershield

General Information


Serial Number98789867
Word MarkCISCO HYPERSHIELD
Filing DateTuesday, October 8, 2024
Status638 - NEW APPLICATION - ASSIGNED TO EXAMINER
Status DateThursday, April 10, 2025
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesComputer hardware; downloadable software for application security; downloadable cybersecurity software; downloadable software for providing endpoint security; downloadable computer software for data security and data protection; downloadable software for application security testing; downloadable software using artificial intelligence for cybersecurity and monitoring; downloadable software using artificial intelligence for data security consulting; downloadable software using artificial intelligence for cybersecurity risk management; downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; downloadable software using artificial intelligence for use in machine learning, cloud and data security, data access, management and collection, cyber threat detection and prevention and data risk analysis; downloadable computer software for computer network management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; downloadable software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; downloadable software for controlling network security and access, and for implementing network security policies; downloadable software for data security for use in machine-to-machine and machine-to-people communications networks; downloadable software for adaptive risk-based decision making in the field of computer security; downloadable software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable software for computer security testing; downloadable software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; downloadable software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; downloadable software for industrial attack surface management; downloadable software for computer system and computer network vulnerability testing; downloadable software for computer system security analysis using digital twins; downloadable software for segmenting computer systems and networks; downloadable data analytics software for cybersecurity and computer system threat intelligence; downloadable software for computer system and network threat detection and response; downloadable software for simulating computer system and network security breaches and attacks.
Goods and ServicesProviding temporary use of online non-downloadable software in the field of application security and data security; Providing temporary use of online non-downloadable software for endpoint security; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity and monitoring; providing temporary use of online non-downloadable software using artificial intelligence for data security consulting; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity risk management; providing temporary use of online non-downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring artificial intelligence software for cybersecurity and monitoring; software as a service (SaaS) featuring artificial intelligence software for data security consulting; software as a service (SaaS) featuring artificial intelligence software for cybersecurity risk management; software as a service (SaaS) featuring artificial intelligence software for monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring software for application security testing; software as a service (SaaS) services featuring software for computer networking management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; software as a service (SaaS) services featuring software for data security and data protection; software as a service (SaaS) services featuring software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; software as a service (SaaS) services featuring software for controlling network security and access, and for implementing network security policies; software as a service (SaaS) services featuring software for data security for use in machine-to-machine and machine-to-people communications networks; software as a service (SaaS) services featuring cybersecurity software; software as a service (SaaS) services featuring software for adaptive risk-based decision making in the field of computer security; software as a service (SaaS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; software as a service (SaaS) services featuring software for computer security testing; software as a service (SaaS) services featuring software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; software as a service (SaaS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SaaS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SaaS) services featuring software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; software as a service (SaaS) services featuring software for industrial attack surface management; software as a service (SaaS) services featuring software for computer system and computer network vulnerability testing; software as a service (SaaS) services featuring software for computer system security analysis using digital twins; software as a service (SaaS) services featuring software for segmenting computer systems and networks; software as a service (SaaS) services featuring data analytics software for cybersecurity and computer system threat intelligence; software as a service (SaaS) services featuring software for computer system and network threat detection and response; software as a service (SaaS) services featuring software for simulating computer system and network security breaches and attacks; computer security and computer network security consultancy; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to access information security vulnerabilities; computer security services, namely, restricting unauthorized access to computer networks; computer security threat analysis for protecting data and critical computer systems; computer security services in the nature of administering digital keys; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; monitoring of computer system operation by remote access; technical support services, namely, troubleshooting computer software problems, and services for the updating, maintenance, installation, repair, and customization of computer software; planning, design and implementation of computer technologies for others; computer virus protection services; Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of collecting and disseminating information from computer networks about cyber threats and malware; monitoring of computer systems for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; computer network and internet security services; research in the field of cybersecurity; providing information in the field of computer network and internet security; providing technical information in the field of computer software applications; providing technical information in the field of big data computer network security analytics.

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateTuesday, October 8, 2024
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, October 8, 2024
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameCisco Technology, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressSan Jose, CA 95134

Trademark Events


Event DateEvent Description
Tuesday, October 8, 2024NEW APPLICATION ENTERED
Wednesday, April 9, 2025NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Thursday, April 10, 2025ASSIGNED TO EXAMINER