FEARLESSLY FORWARD

EUIPO EUIPO 2019 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark FEARLESSLY FORWARD was filed as Word mark on 11/26/2019 at the European Union Intellectual Property Office.
It was registered as a trademark on 05/22/2020. The current status of the mark is "Trademark registered".

Trademark Details Last update: February 9, 2024

Trademark form Word mark
File reference 018157918
Application date November 26, 2019
Publication date December 19, 2019
Entry date May 22, 2020
Expiration date November 26, 2029

Trademark owner

9 Ha'psagot St., Park Ofer 2
4951041 Petach-Tikva
IL

Trademark representatives

Via Porlezza 12 20123 Milano IT

goods and services

9 Downloadable computer software for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyber-related threats; downloadable computer software for transparently removing local administrative rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; downloadable computer software for protecting, securing, managing and auditing, credentials and secrets used by computer applications, automation scripts tools and other machine and non-human identities to securely access databases, web-services and other resources required to perform computing functions and deliver services, including all widely used non-human identities and application types including third party off-the-shelf software, internally developed application software, automation scripts, containerized, cloud, SaaS, PaaS, hybrid, mainframe and other software components, solutions, and compute environments; downloadable computer software for enabling secure application access over computer networks and over the internet, for protecting user identity using multi factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access, providing biometric user authentication services using biometric hardware and software technology, and for third party accounts management and related session activity monitoring; and downloadable electronic computer manuals distributed with the foregoing
42 Design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyberrelated threats; design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for transparently removing local administrative rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; design, development, implementation of and consulting on computer software for protecting, securing, managing and auditing, credentials and secrets used by computer applications, automation scripts tools and other machine and non-human identities to securely access databases, web-services and other resources required to perform computing functions and deliver services, including all widely used non-human identities and application types including third party off-the-shelf software, internally developed application software, automation scripts, containerized, cloud, SaaS, PaaS, hybrid, mainframe and other software components, solutions, and compute environments; and design, development, implementation of and consulting on computer software, and software as a service (SAAS) services featuring software, for enabling secure application access over computer networks and over the internet, for protecting user identity using multi factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access, providing user authentication services using biometric hardware and software technology, and for third party accounts management and related session activity monitoring

Trademark history

Date Document number Area Entry
May 8, 2023 Change Representative, Published
July 27, 2022 Change Representative, Published
November 6, 2020 Transfer / Change of address, Published

ID: 11018157918