Cb

EUIPO EUIPO 2016 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark Cb was filed as Figurative mark on 08/30/2016 at the European Union Intellectual Property Office.
It was registered as a trademark on 01/30/2017. The current status of the mark is "Trademark registered".

Logodesign (Wiener Klassifikation)

#Squares #One quadrilateral #Quadrilaterals containing one or more letters #Letter 'B' #Letter 'C'

Trademark Details Last update: February 8, 2024

Trademark form Figurative mark
File reference 015792153
Application date August 30, 2016
Publication date October 21, 2016
Entry date January 30, 2017
Expiration date August 30, 2026

Trademark owner

1100 Winter Street,
02451 Waltham
US

Trademark representatives

5 Dartmouth Road 6 Dublin IE

goods and services

9 Computer programs and software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; computer programs and software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; computer programs for use, including on a real-time basis, in tracking software, data files, and executable files in computer networks, endpoints, mobile phones and portable and handheld electronic devices for use in identifying unauthorized, new or unknown software, data files, and executable files, and for blocking unauthorized software executions and data access; computer programs for use as an online search engine and as a downloadable utility program; computer programs for preventing viruses and unauthorized access to computer systems, computer networks, endpoints, mobile phones and portable and handheld electronic devices; software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data and communications and endpoints, mobile phones and portable and handheld electronic devices; intrusion detection software
42 Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, mobile phones and portable and handheld electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, mobile phones and portable and handheld electronic devices, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis

ID: 11015792153