Trademark Overview
On Monday, February 2, 2026, a trademark application was filed for KELA with the United States Patent and Trademark Office. The USPTO has given the KELA trademark a serial number of 99628695. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Monday, February 2, 2026. This trademark is owned by KELA RESEARCH AND STRATEGY LTD. The KELA trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:
Software as a service, namely, non-downloadable computer software for monitoring, detecting, investigating, and analyzing cyber threats, security incidents, attacker tactics, techniques and procedures (TTPs), and threat actor profiles; software as a service, namely, non-downloadable computer software for threat detection, data leak and breach detection, brand abuse monitoring, identity and credential compromise detection, risk analysis, threat hunting, incident response, vulnerability assessment, contextual intelligence reporting, digital asset monitoring, Third Party Risk Management, LLM and GenAI application security, organizational AI-Driven Digital Cyber Analysts and threat landscape analysis; Software as a service, namely, non-downloadable computer software for monitoring digital platforms and social media for malicious or harmful content; software as a service, namely, non-downloadable computer software for cybersecurity data integration via APIs; platform as a service, namely, n...
Downloadable computer software for cybersecurity, namely, software for monitoring, detecting, investigating, and analyzing cyber threats, security incidents, attacker tactics, techniques and procedures (TTPs), and threat actor profiles; downloadable software for threat detection, data leak and breach detection, brand abuse monitoring, identity and credential compromise detection, risk analysis, threat hunting, incident response, vulnerability assessment, contextual intelligence reporting, digital asset monitoring, Third Party Risk Management, LLM and GenAI application security, organizational AI-Driven Digital Cyber Analysts and threat landscape analysis; downloadable software for monitoring digital platforms and social media for malicious or harmful content; downloadable software for attack surface management and cybersecurity decision support