EUIPO EUIPO 2015 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark was filed as Figurative mark on 04/17/2015 at the European Union Intellectual Property Office.
It was registered as a trademark on 02/23/2016. The current status of the mark is "Trademark registered".

Logodesign (Wiener Klassifikation)

#Check sign #One circle

Trademark Details Last update: February 9, 2024

Trademark form Figurative mark
File reference 013962361
Application date April 17, 2015
Publication date April 24, 2015
Entry date February 23, 2016
Expiration date April 17, 2025

Trademark owner

60 E Rio Salado Parkway, Suite 1000
85281 Tempe
US

Trademark representatives

2 Dublin Landings, North Wall Quay Dublin 1 IE

goods and services

9 Computer antivirus software; computer software for providing intrusion detection software; Internet security software; enterprise security software; fire wall software; privacy control software; content filtering software; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer software for use in updating other computer software; computer software for use in networking applications; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer software for use with a home or remote office for connecting computer network users to global networks; computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer peripherals for network and Internet security data and system protection, and storage; computer hardware; computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer software; computer software in the field of cryptographic network security and data security functions; computer software for integration of information logic and data between computer networks; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in operating electronic mail; computer software for use in monitoring computers for security purposes; computer software for use with computer servers for controlling and managing server applications; downloadable electronic publications; downloadable electronic publications in the nature of reference, user, technical and instructional manuals and data sheets for use with computer software, and firmware and downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the fields of computer software and computer and on-line security; computer software; computer hardware; electronic mobile communications devices; applications for mobile communications devices; non-printed publications; podcasts and multimedia, all being downloadable from wireless, computer and other communications networks
38 Providing on-line forums and chat rooms for transmission of messages among computer users concerning computers, computer hardware, computer software, computer peripherals, computer systems, computer networks, computer-related equipment, computer security, information technology, electronic commerce technology and global computer network technology, mobile computing, communications networks and devices, and telecommunications equipment and devices; transmittal of anti-virus scanning and other network security software via a global computer network and electronic transmission of electronic mail communications and data featuring encryption and decryption through the management and filtering of mail sent via global computer network; Internet access services; electronic telecommunications services; communications services in the nature of transport, routing and switching of signaling messages and information to and from various telecommunications switches, networks and databases; telephone voice messaging; transport of signaling messages and information for banking, credit and financial verification; transport of signaling messages and information to and from cellular switches, databases and networks; telephone communications services; wireless telephone services; prepaid wireless telephone services; wireless, electronic, electric and digital transmission of voice, data, images, signals and messages including short messaging service (SMS) and multimedia messaging service (MMS); electronic transmission of messages and data to communications carriers; virtual private network services, namely, providing remote access to local area networks; providing on-line forums for transmission of messages among computer users; providing on-line chat rooms for transmission of messages among computer users; providing data access and delivery services; provision of information, advisory and consultancy services, all relating to the aforesaid, in person, by telephone or on-line or via the Internet
42 Technical support services, namely, troubleshooting of computer hardware and software problems; computer software installation services; technical consultation in the field of computer software installation and maintenance; notification and delivery of software updates; providing authentication of identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access; application hosting; web hosting; consulting in the field of computer and computer networks, namely, turnkey e-commerce services; providing data storage services; computer support services, namely, technical support and software update services; computer consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, data recovery services; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; development, updating and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information and online database regarding computers, computer hardware, computer software, computer networks, computer-related services, data storage management, enterprise information management, and online analytical processing (OLAP); web content categorization and filtering services; computer services; network and Internet security services; computer consultation; computer consultation in the field of computer security; computer diagnostic services; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; application service provider services; remote or on-site monitoring of computer systems; monitoring the computer systems of others and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, namely providing information concerning the encryption and authentication of electronic data; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer services; Internet security services; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; technical support services, namely, troubleshooting of computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; computer programming; computer software design for others; technical consultation in the field of computer software installation and maintenance; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely providing information concerning the encryption and authentication of electronic data; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; provision of technical assistance, support and telephone helpline services in the fields of computer hardware and software; application service provider services; providing temporary use of nondownloadable software; design, development, maintenance, installation and updating of software; cloud computing services; provision of information relating to computer software; monitoring of computer systems for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of computer and Internet security, preventing computer threats, computer hardware and software applications; business services in the nature of managed public key infrastructure (PKI) services, namely, application and network infrastructure security services; providing user authentication services in e-commerce transactions; business management, namely, issuance of digital certificates for authentication; providing information in the fields of global computer network and electronic network security, preventing computer viruses, computer hardware and software security; electronic storage of data; electronic document and email archiving services; provision of information, advisory and consultancy services, all relating to the aforesaid, in person, by telephone or on-line or via the Internet
45 Providing authentication of identity; personal background investigation services in order to authenticate identity; security consultancy; licensing of technology, source code, computer software and other intellectual property; licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data; provision of information, advisory and consultancy services, all relating to the aforesaid, in person, by telephone or on-line or via the Internet

Trademark history

Date Document number Area Entry
October 26, 2023 Transfer / Change of address, Published
October 14, 2021 Change Representative, Published
January 7, 2021 Change Representative, Published
March 2, 2020 Transfer / Change of address, Published
May 24, 2019 Change Representative, Published
June 19, 2015 Change Representative, Registered
April 24, 2015 Change Representative, Published

ID: 11013962361