on 9 Nov 2020
Last Applicant/ Owned by
CyberArk Software Ltd
9 Ha'psagot St., Park Ofer 2
Petach Tikva, , 4951041
Serial Number
UK00003553603 filed on 9th Nov 2020
Registration Number
UK00003553603 registered on
9th Apr 2021
Correspondent Information
Stevens Hewlett & Perkins
1 St Augustine's Place
Bristol,
BS1 4UD
Downloadable computer software featuring software for managing access control settings for Information Technology infrastructure, software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, software for adaptive risk-based decision making, software for auditing and monitoring computer systems, computer system resources, human and non-human user activity, software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; for implementing least privilege access across computer networks network and cloud environments, software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization’s network and cloud environment, software for integrating with privileged access management solutions and for securing computer networks and cloud resources; downloadable electronic computer manuals distributed with the foregoing goods.
Software as a service (SAAS) services featuring software for managing access control settings for Information Technology infrastructure, software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, software for adaptive risk-based decision making, software for auditing and monitoring computer systems, computer system resources, human and non-human user activity, software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, software for implementing least privilege access across computer networks network and cloud environments, software for utilizing Artificial Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization’s network and cloud environment, software for integrating with privileged access management solutions and for securing computer networks and cloud resources; consulting, advisory, and information services relating to products and services in the foregoing fields.
UK00003553603
Word
Individual