WE GO BEYOND

EUIPO EUIPO 2017 Anmeldung zurückgewiesen

Schützen Sie diese Marke vor Nachahmern!

Mit unserer Markenüberwachung werden Sie automatisch per E-Mail über Nachahmer und Trittbrettfahrer benachrichtigt.

Die Unionsmarke WE GO BEYOND wurde als Wortmarke am 20.06.2017 beim Amt der Europäischen Union für Geistiges Eigentum angemeldet. Der aktuelle Status der Marke ist "Anmeldung zurückgewiesen".

Markendetails Letztes Update: 23. Mai 2018

Markenform Wortmarke
Aktenzeichen 016901019
Anmeldedatum 20. Juni 2017

Markeninhaber

Suite 500, 2801 North Thanksgiving Way
84043 Lehi
US

Waren und Dienstleistungen

9 Computer software; computer hardware; computer software for providing network, internet, and computer security; computer antivirus software; internet and data security software; enterprise security software; firewall software; computer utility software; privacy control software; content filtering software; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; computer software for providing online identity protection, privacy control, and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; computer software for detection and prevention of identity theft and fraud; computer optimization software; computer software to prevent, diagnose and repair computer problems; computer maintenance software; computer software for the creation of virtual private network; computer software for the back-up, storage, restoration and recovery of data, folders, and files; computer software for file management and transfer; computer software for use in updating other computer software; computer application software for use in electronic storage of data, documents and receipts; computer application software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer programs for the encryption and authentication of electronic information; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers and applications; computer software for use in monitoring computers for security purposes; computer software in the field of cryptographic network security and data security functions; downloadable user manuals and instructional guides for use in connection with all of the foregoing; downloadable electronic publications in the nature of newsletters in the fields of computer software and network security
42 Monitoring of computer systems for security purposes; computer services; providing information in the fields of global computer network and local area network security, preventing computer viruses; computer network security and Internet security services; computer virus protection services; identity theft protection services, namely, fraud prevention in the form of personal and financial information monitoring; software as a service (SaaS) service featuring software for personal information management, software to help consumers identify and opt out from public websites and databases to increase privacy and reduce unwanted solicitations, and software for fraud protection and identity theft prevention; web content categorization and filtering services; technical support services, namely, troubleshooting of problems with computer software and computer networks; maintenance, installation and updating of computer software for others; consulting services for others in the field of computer software, computer network security and internet security; computer programming; computer software design for others; leasing, hire and rental of computers, computer hardware, computer systems, computer programs and computer software; providing security threat management systems, namely, monitoring and tracking of malware, security vulnerabilities and problems in computer software, the internet, and computer networks; computer services relating to computer, network and internet security, including content screening and filtering services, virus scanning and protection services, access control services, authorization management services, web usage monitoring services, and bandwidth management and protection services; notification and delivery of software updates; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; on-line technical support services, namely, troubleshooting of computer software problems; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; provision of security services for virtual private computer networks (VPNs); providing on-line, non-downloadable software for computer and Internet security testing; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; managed public key infrastructure (PKI) services, namely, application and network infrastructure security services; providing identity verification services in e-commerce transactions; computer services relating to fraud and identity theft protection; monitoring the Internet, public records, credit reports, private and public electronic databases, and unregulated global computer networks to facilitate the detection of and protection against identity theft and fraud; computer services, namely, data recovery services; technical support services, namely, providing back-up computer programs and facilities; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; updating, providing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection; providing online database regarding computers, computer hardware, computer software, computer networks, computer-related services, data storage management, enterprise information management, and online analytical processing (OLAP)
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen

Markenhistorie

Datum Belegnummer Bereich Eintrag
12. Februar 2018 Übertragung / Adressänderung, Registered
19. Januar 2018 Übertragung / Adressänderung, Registered
09. Januar 2018 Änderung Vertreter, Registered

ID: 11016901019