ZEGURO

EUIPO EUIPO 2019 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark ZEGURO was filed as Word mark on 05/04/2019 at the European Union Intellectual Property Office.
It was registered as a trademark on 10/16/2019. The current status of the mark is "Trademark registered".

Trademark Details Last update: August 30, 2022

Trademark form Word mark
File reference 018060871
Application date May 4, 2019
Publication date July 9, 2019
Entry date October 16, 2019
Expiration date May 4, 2029

Trademark owner

123 Mission St, Level 16
94105 San Francisco, California
US

Trademark representatives

Heinrich-Heine-Allee 12 40213 Düsseldorf DE

goods and services

36 Cyber insurance brokerage; insurance underwriting in the field of electronic and cyber risk, liability, and network security; insurance services, namely, the provision of underwriting and claims management in the field of cyber insurance; providing information in the field of cyber insurance and cyber insurance premiums
41 Provision of targeted employee training regarding cyber risk exposure
42 Computer security consultancy; information technology consultation; computer security consultation in the field of assessing, correcting, defending and managing cyber security; information technology consulting in the field of cyber security solutions; information technology consulting in the field of compliance with data privacy and data security regulations; technology consultation in the field of cyber security and cyber risk assessment; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerabilities; cybersecurity assessment services, namely, computer security threat analysis for protecting data security, data privacy and managing cybersecurity regulations and standards; providing temporary use of non-downloadable cyber security software to reduce risk of cyber threats; providing temporary use of non-downloadable software for cyber security and cyber risk assessment; providing temporary use of non-downloadable cyber security software to detect and mitigate against cyber risks, threats and vulnerabilities; providing temporary use of non-downloadable cyber security software for preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable software for conducting assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing customizable training modules to software users who demonstrate susceptibility to malicious electronic mail; providing temporary use of non-downloadable software for cybersecurity training and reporting purposes that replicates real-world cyber-attacks to enable employees and others how to identify, report, and avoid cybersecurity threats; providing temporary use of non-downloadable software for use in analyzing and measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; providing temporary use of non-downloadable software for use in monitoring and tracking compliance with laws and regulations in the fields of data privacy and data security; providing temporary use of non-downloadable software for cybersecurity training; design, development, and implementation of software in the fields of cyber security and information assurance; software development and product development consulting in the field of cyber security and cyber risk assessment; design, development and implementation of strategies to address cyber risk exposure, namely, continuous cyber risk monitoring, automated web vulnerability testing, cybersecurity regulation and standards tracking and management, cybersecurity compliance and control tracking, application security management and monitoring, and cloud application security monitoring; conducting computer security threat assessments of information technology IT security policies and procedures for protecting data; providing a website featuring information on cyber risk management and computer security

Trademark history

Date Document number Area Entry
August 29, 2022 Change Representative, Published
November 30, 2020 Change Representative, Published

ID: 11018060871