Palo Alto Networks, Inc.

 Palo Alto Networks, Inc. contact information is shown below
Owner:PALO ALTO NETWORKS, INC.
Owner Address:3000 Tannery Way Santa Clara CA 95054
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byPalo Alto Networks, Inc.

Brand:

AXOR

Description:

Downloadable computer software for monitoring, managing and securing computer systems and networks; downloadable computer software for developing, deploying, operating, monitoring, configuring, customizing, implementing and managing of computer systems and applications, excluding software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; downloadable computer software for management of business processes; downloadable computer software for information technology service automation; downloadable computer software for workflow and business process automation; downloadable computer software for the automation of customer operations in the field; downloadable computer software for performance analytics and monitoring and controlling communication between computers and automated machine systems, all excluding services in connection with sanitary products and their accessories, in particular for bath and kitchen, and furniture products;Planning, design and management of information technology systems; Computer services for monitoring and managing computer systems and networks and for on-site management of information technology (IT) systems of others; Computer services for securing computer systems and networks of others, namely, restricting unauthorized access to computer systems and networks of others; Computer project management services; Consulting services in the field of information technology; software implementation; software development, excluding software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Cloud hosting provider services; Implementation of computer technologies for others, namely, information technology automation services; Providing information in the field of information technology; Providing enterprise-level software as a service (SAAS) services featuring software for the management of computer-based information systems for businesses; Providing temporary use of non-downloadable software to others for managing, tracking, analyzing, and reporting data; developing, deploying, operating, monitoring, configuring, customizing, implementing, and managing computer systems and applications, excluding non-downloadable software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Management of information technology systems, namely, managing computer-based information systems for businesses; Implementation of computer technologies for others, namely, information technology service automation; providing temporary use of online non-downloadable computer software for workflow and business process automation; Information technology consulting services, namely, identifying elements of information technology infrastructure; Providing temporary use of online non-downloadable software for generating performance analytics for facilities management and automation; Information technology consulting services, namely, field service automation and application integration and to analyze, test, assess, configure, customize, and implement computer software; Infrastructure-as-service (IaaS) featuring computer software platforms for creating, managing and deploying cloud computing infrastructure services; Platform as a service (PAAS) featuring a non-downloadable computer software platform for use by others to develop, configure, customize, and deploy software applications, excluding software platforms for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites; Software-as-a-service (SaaS) services featuring software for use in managing business processes; Cloud computing services, namely, cloud computing featuring software for use in developing, configuring, customizing and deploying software applications, excluding cloud computing featuring software for user interface or user experience (UI / UX) design or prototyping of mobile applications or websites, managing business processes, and managing computer-based information systems and monitoring, managing and securing computer systems and networks; providing temporary use of online non-downloadable computer software for monitoring, managing and securing computer systems and networks; providing temporary use of online non-downloadable computer software for performance analytics and monitoring and controlling communication between computers and automated machine systems, all excluding services in connection with sanitary products and their accessories, in particular for bath and kitchen, and furniture products;

Category: DOWNLOADABLE COMPUTER SOFTWARE MONITORING
Brand:

CLOUD SENTRY

Description:

On-line journals, namely, blogs featuring information related to computer system and cloud security;CLOUD;

Category: ON LINE JOURNALS
Brand:

CORTEX

Description:

Computer hardware, namely, firewalls and networks security devices in the nature of network routers, excluding integrated circuits, microprocessors and microprocessor cores; downloadable computer software for computer network security, excluding computer software used for designing and developing integrated circuits, microprocessors, and microprocessor cores;

Category: COMPUTER HARDWARE
Brand:

CORTEX

Description:

Technological consultation in the field of computer networking and network security, excluding technological consultation in the field of integrated circuits, microprocessors, and microprocessor cores; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security, excluding technical support services for diagnosing computer hardware and software problems related to integrated circuits, microprocessors and microprocessor cores; software as a service (SAAS) services featuring software for security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits;

Category: TECHNOLOGICAL CONSULTATION FIELD
Brand:

CORTEX XDR

Description:

Computer hardware, namely, firewalls and networks security devices in the nature of network routers, excluding integrated circuits, microprocessors and microprocessor cores; downloadable computer software for computer network security, excluding computer software used for designing and developing integrated circuits, microprocessors, and microprocessor cores;XDR;Technological consultation in the field of computer networking and network security, excluding technological consultation in the field of integrated circuits, microprocessors, and microprocessor cores; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security, excluding technical support services for diagnosing computer hardware and software problems related to integrated circuits, microprocessors and microprocessor cores; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection and analysis of malware and zero-day exploits;

Category: COMPUTER HARDWARE
Brand:

CORTEX XDR

Description:

Computer hardware, namely, firewalls and networks security devices in the nature of network routers; downloadable computer software for computer network security and network traffic analysis;XDR;Technological consultation in the field of computer networking and network security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems related to computer network security; software as a service (SAAS) services featuring software for use in computer network security; software as a service (SAAS) services, namely, hosting software for use by others for use in computer network security; software as a service (SAAS) services featuring software for network traffic analysis; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection and;

Category: COMPUTER HARDWARE
Brand:

CORTEX XPANSE

Description:

Providing a database featuring information, analytics and statistics about commodities for use in the field of finance; Providing risk metrics in the nature of financial risk assessment and actuarial services to provide statistical distributions, data, and software for insurance and reinsurance purposes; providing online prediction services in the field of commodities, namely, predictions relating to the creation, movement and disposition of commodities, namely, providing financial risk assessments regarding globally distributed information technology assets related to commodities and commodities sectors; financial research, analysis and consultation; computer analysis of commodity and financial information based on deployed IT systems; financial analysis, namely, compiling and analyzing statistics, data and other sources of information for financial purposes;Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; software as a service (saas) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; application service provider featuring application programming interface (api) software for downloading internet intelligence information, edge tracking remediation statuses, and information about risks on enterprise network edges; computer services, namely, electronic digitizing of or data visualizations in the nature of maps of internet connected assets and external facing protocols and services and mapping of data related to information technology assets and their associated behaviors; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; data mining; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing on-line non-downloadable software for use in connection with any one or more of the previously named services for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; providing on-line non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; development, maintenance, repair, and configuration of software for machine learning; development, maintenance, repair, and configuration of software for forecasting, predicting, and monitoring system failures; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; data security consultancy; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; development of electronic reporting for others using computers or sensors of information technology assets, computer networking systems and appliances, and cloud computing platforms for use in risk assessment, information security, business analysis, audit and audit planning, and process management;

Category: PROVIDING DATABASE FEATURING INFORMATION
Brand:

CORTEX XSIAM

Description:

Providing non-downloadable software for autonomous threat detection, collection, monitoring, and analysis of patterns for identifying cyber threats to network and cloud security; providing non-downloadable cloud computing software using artificial intelligence for telemetry monitoring, and threat detection, intelligence, and response; providing non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing non-downloadable software and applications for autonomous management of security operations and incident response; providing non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; software as a service (SAAS) featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach, and detection; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; data automation and collection service using proprietary software to evaluate, analyze and collect service data;

Category: PROVIDING NON DOWNLOADABLE SOFTWARE AUTONOMOUS
Brand:

CORTEX XSOAR

Description:

Downloadable software and applications for detecting, collecting, monitoring, and analyzing patterns to identify cyber threats to network and cloud security; downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable software and applications for the management of security operations and incident response; downloadable software and applications for detecting, collecting, monitoring, and analyzing unauthorized access, data breaches, endpoint security violations, phishing attacks, ransomware, network security violations, cloud security violations, security vulnerabilities, and malware;CORTEX X SOAR;Operating an online marketplace featuring downloadable software, namely, applications for security automation and use in security operations centers;

Category: DOWNLOADABLE SOFTWARE APPLICATIONS
Brand:

E

Description:

The mark consists of a stylized capital letter E in white inside an inverted triangular shaped background in blue.;EVIDENT;The color(s) blue and white is/are claimed as a feature of the mark.;Software as a service (SAAS) services featuring software for data security and system security in the field of cloud computing;

Category: