EUIPO EUIPO 2020 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark was filed as Figurative mark on 01/21/2020 at the European Union Intellectual Property Office.
It was registered as a trademark on 08/01/2020. The current status of the mark is "Trademark registered".

Logodesign (Wiener Klassifikation)

#Squares #Rectangles #Two quadrilaterals, one inside the other #Quadrilaterals with dark surfaces or parts of surfaces #Quadrilaterals containing one or more lines or bands (specify the content) #Oblique lines or bands #More than three lines #Red, pink, orange #White, grey, silver

Trademark Details Last update: February 9, 2024

Trademark form Figurative mark
File reference 018186090
Application date January 21, 2020
Publication date April 24, 2020
Entry date August 1, 2020
Expiration date January 21, 2030

Trademark owner

Trademark representatives

Via Leonida Bissolati, 20 00187 Roma IT

goods and services

9 Risk detection software; Operational risk management software; Artificial intelligence and machine learning software; Utility, security and cryptography software; Electronic security bulletins for businesses; Computer databases; Computer software to automate data warehousing; Computer software for backup and recovery of databases and servers; computer software for database imaging, server imaging, and disk imaging; computer software for snapshot generation, backup, and disaster recovery; computer software for server backup and recovery, including server recovery via server migration by restoration to a server instance on a different physical machine; Downloadable computer software for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyber-related threats; Downloadable computer software for transparently removing local administrator rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, block and contain advanced persistent threat attacks at the endpoint; Downloadable computer software for helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; Downloadable computer software for protecting, securing, managing and inspecting credentials and secrets used by computer programs, automation scripts and other machine and non-human identities in order to securely access databases, web services and other resources required to execute computing functions; Downloadable computer software for providing services, including widely-used applications of all kinds and non-human identities, including software of others already on the market, internally-developed software applications, automation scripts, placed in containers, on the cloud, SaaS, PaaS, hybrids, mainframes and other software components, solutions and computing environments; Downloadable computer software for enabling secure application access over computer networks and over the internet, for protecting user identity using multi-factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access; Downloadable computer software for providing biometric user authentication using biometric technology, hardware and software, and for accounts management of others and related session activity monitoring; Downloadable electronic computer manuals distributed with the aforesaid; Computer software and hardware for digital security, cyber security, Internet security, data security and network security; Computer security products, namely, peripherals designed for use with computers; computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; Computer software and computer hardware for detection, blocking, monitoring, filtering, reporting and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, advanced persistent threats, network traffic, malware, spyware, unauthorised software and network attacks; Computer software for preventing intrusion into computer networks, websites, and other computer systems, and related computer hardware, and for security, configuration auditing, and vulnerability scanning of computer networks; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; software for cryptographic network and data security functions, namely, browser independent verification and validation of website authenticity allowing protection from browser based computer software and hardware hacking and online fraud, via online identification authentication of website proprietors in real-time; computers and/or computer programmes, data processing apparatus and/or instruments, adapted for use in independently verifying and validating the authenticity of websites; computer software for analysis and reporting of computer firewall log data; computer software for automating a process for secure authentication of website identity; Internet security software, namely, to provide security in electronic transactions and communications that take place over the Internet; software for secure protection against Internet security vulnerabilities, namely, web based security software for antiphishing, anti-pharming, anti-DNS Poisoning, anti-man in the middle attacks, anti- frame spoofing, anti-MD5, anti-virus, anti-spyware, anti-adware, anti-spam; web based software for security, namely, transaction security against online fraud, intrusion prevention and detection, content filtering software, privacy, namely, privacy control software; security encryption software for use in the secure transmission of digital information in the field of banking and/or e-commerce, over the Internet, namely, confidential information, financial information, credit and/or debit card information; software for the integration of managed security services, namely, the issuance of digital online website authentication verification, and/or enterprise security software integration, with existing communications networks, software and services; Software, namely, protocol conversion software for translating messages and/or information between telecommunications protocols and/or languages; Electronic publications, downloadable
35 Risk management consultancy [business]; Advisory services relating to business risk management; Processing of administrative and security data and for managing security incidents; Public awareness campaigns relating to all aspects of computer security in the context of business; Market reports and studies; Collection, study and analysis of indicators for the prevention of potential cyber attacks; Business analysis, providing of information; Business support, administrative management and services; Compilation of statistics; Information (business —); Management of business projects [for others]; Business auditing, business auditing; Marketing research, consulting and analysis; research, consulting and strategic planning services in the field of business; Business consulting; Computerized file management
36 Insurance consultancy; Insurance claim assessments and financial risk assessment; provision of financial transaction processing services by electronic means, and monitoring of financial transactions; provision of financial management services, namely, electronic delivery, transfer, and processing of payments, funds, transactions and information through the use of the Internet; financial services, namely, online sale and purchase transactions, security, authorisation authentication, identification, validation, and verification services; all of the aforesaid services relevant to the field of digital security, cyber security, Internet security, data security and network security
38 Communication of information by electronic means; Sharing of information resulting from risk analysis with accredited entities/organisations; Computer communication and Internet access; Broadcasting services; Telephone and mobile telephone services; Provision and rental of telecommunications facilities and equipment; Provision of broadband telecommunications access; Communications via multinational telecommunication networks; Mobile radio communications; Provision of communications via radio; Telematic communications via computer terminals; Communication by telegram; Communications by telephone; Communications by television for meeting; Telegraph services; Communication by radio; Communication by hertzian wave; Communication of information by satellite; Data communication by electronic means; Communication of data by means of telecommunications; Communication by electronic means; Transfer of information by radio; Communication network consultancy; Professional consultancy relating to telecommunications; Telecommunications consultancy; Electronic communications consultancy; Providing of access to telecommunication warehousing services; Providing electronic telecommunication connections; Provision of information relating to media communications; Provision of communications facilities for the interchange of digital data; Providing facilities and equipment for video conferencing; Supply of airtime for communication services; Providing access to telecommunication networks; Operation of a telecommunications network; Operation of telecommunications systems; Wire agency [communication] services; Information relating to communications; Information about telecommunication; Electronic network communications; Retransmission of images via satellite; Relaying of television programmes by extra-terrestrial satellite; Virtual chatrooms established via text messaging; Audiovisual communication services; News agencies; News agency services for electronic transmission; News agency services for telecommunications; News agency services [transmission of news]; Providing high speed access to computer and communication networks; Telecommunications access services; Advisory services relating to communications equipment; Electronic communications services relating to credit card authorization; Wireless communications services; Communication services for the delivery of emergency messages; Communications services for the exchange of data in electronic form; Communication services for the electronic transmission of data; Communication services for the electronic transmission of images; Broadband radio communication services; Narrowband radio communication services; Radio frequency communications services; Radio telephone communication services; Teleprinter communication services; Communication services provided electronically; Information services relating to telecommunications; Information services relating to electronic communication networks; Providing access to electronic communications networks and electronic databases; Message sending and receiving services; Message sending services; Telecommunications routing and junction services; Information, consultancy and advisory services relating to telecommunications; Consultancy services relating to data communications; Consultancy in the field of telecommunications; Consulting services in the field of electronic communications; Network conferencing services; Provision of telecommunications connections for telephone chat lines; Telecommunications services, namely, personal communication services; Communication services by satellite; Telecommunications services using cellular radio networks; Telecommunications services provided by means of optical fibre networks; Telecommunications services for aircraft passengers; Telecommunications services to obtain information from data banks; Optical fibre telecommunications services; Telegraph telecommunications services; Telecommunications services between financial institutions; Telecommunications services between computer networks; Interactive telecommunications services; Telecommunications services for the distribution of data; Air to ground telecommunications services; Video uploading services; Photo uploading services; Mobile telecommunication network services; Radio communication network services; Interactive broadcasting and communications services; Maritime radio-telephone network services; Radio-facsimile services; Message services; On-line information services relating to telecommunications; Radio information services; Information and advisory services relating to telecommunication services; Video communication services; Telex services; Data transmission and reception services via telecommunication means; Secure transmission of data, sound or images; Electronic and telecommunication transmission services; Digital transmission services for audio and video data; Electronic transmission of voices (Services for the -); Digital transmission services; Television screen based text transmission services; Voice and data transmission services; Video transmission services; Information transmission services via digital networks; Ticker tape services; Telematics services accessible by password; Teletyping; Time sharing services for communications apparatus; Data transmission services over telecommunications networks; Data transmission services over telematic networks; High bit-rate data transmission services for telecommunication network operators; Teleconferencing and video conferencing services; Telecommunications services provided via fiber optic, wireless and cable networks; Telecommunications services for facsimile transmission of information; Telecommunications services for typesetting; Digital network telecommunications services; Fixed line telecommunication services; Transmission of data, messages and information; Transmission of data by teletypewriter; Transmission of data by laser beam; Transmission of data by microwave; Data transmission; Transmission of audio and video content via satellite; Transmission of encrypted communications; Transfer of data by telecommunications
41 Providing of training and awareness relating to computer security, in particular in the context of business; Educational and training programs in the field of risk management; Technical training relating to business and industrial risks; Arranging and conducting of congresses; Organisation of seminars; Provision of training courses; Tuition; Practical training [demonstration]; Know-how transfer [training]; Workshops for training purposes; Educational and teaching services; Conducting of seminars and congresses; Arranging and conducting of conferences; Coaching [training]; Educational instruction; Tutoring; Providing of training; Arranging and conducting of in-person educational forums; Training; Education and instruction
42 Scientific risk assessment; Provision of computer security risk management programs; Updating of computer software relating to computer security and prevention of computer risks; Maintenance of computer software relating to computer security and prevention of computer risks; Science and technology services; Testing, authentication and quality control; Software development, programming and implementation; IT consultancy, advisory and information services; Software as a service (SaaS); Platform as a service [PaaS]; Design services; Providing of artificial intelligence computer programs on data networks; Data security consultancy; Computer security threat analysis for protecting data; Design and development of electronic data security systems; Computer system design and development; Comparative analysis studies of the efficiency of computer systems; Providing information on computer technology and programming via a web site; Data security services [firewalls]; Computer virus protection services; Creating and designing website-based indexes of information for others [information technology services]; Technological research; Software as a service [SaaS]; Monitoring of computer systems for detecting unauthorized access or data breach; Computer software consultancy; Computer system analysis; Computer system design; Data security services; IT security, protection and restoration; Development of computer platforms; Monitoring of computer systems by remote access; Consultancy in the field of computers; Technological consultation services; Computer system monitoring services; Information technology [IT] consultancy; Internet security consultancy; Research in the field of telecommunications technology; Consultancy in the design and development of computer hardware; Telecommunications technology consultancy; Web site design consultancy; Computer programming; Computer system design; Monitoring of computer systems to detect breakdowns; Providing of online non-downloadable internet security software; Consultancy for others in computer forensics; Consultancy for others relating to internet security hardware and software; Computer security consultancy for others relating to the prevention of unauthorised access to computers and electronics systems; Design, development, implementation of and advice on computer software and software as a service (SaaS) featuring software for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording user sessions; Design, development, implementation of and advice on computer software for detecting suspicious or malicious user activity and cyber threats; Design, development, implementation of and advice on computer software and software as a service (SaaS) featuring software for transparently removing local administrator rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface; Design, development, implementation of and advice on computer software for mitigating the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, for helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; Design, development, implementation of and advice on computer software for protecting, securing, managing and inspecting credentials and secrets used by computer programs, automation scripts and other machine and non-human identities in order to securely access databases; Design, development, implementation of and advice on web services and other resources required to execute computing functions and for the providing of services, including widely-used applications of all kinds and non-human identities including software of others already on the market, internally-developed software applications, automation scripts, placed in containers, on the cloud, SaaS, PaaS, hybrids, mainframes and other software components, solutions and computing environments; Design, development, implementation of and advice on computer software and software as a service (SaaS) featuring software for enabling secure application access over computer networks and over the internet, for protecting user identity using multi-factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access; IT services for providing biometric user authentication using biometric technology, hardware and software, and for accounts management of others and related session activity monitoring; Design, development, implementation, updating and strategic planning services of computer software for digital security, cyber security, cyber risk management; data breach response and crisis management; Internet security, data security and network security; Provision of information relating to information technology; provision of information and data relating to digital security, cyber security, cyber risk management, data breach response and crisis management, Internet security, data security and network security; assessment of, and analytical services relating to, digital security, cyber security, cyber risk management, data breach response and crisis management, Internet security, data security and network security; compliance auditing, assessment and reporting, in relation to digital security, cyber security, cyber risk management, data breach response and crisis management, Internet security, data security and network security; Consultancy in the field of computer security; research into new computer and Internet security threats; computer and Internet virus protection services; technical support services for the use of computer software in the field of Internet security; Recovery of computer data; technical support, advice and consulting services related to security and vulnerability to cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support, advice and consulting services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services utilising software and databases for use in computer security and prevention, and the mitigation of cyber risks; providing temporary use of on-line nondownloadable cloud computing software for computer network security; consultation and research in the field of computer hardware and computer software applied to digital security and cyber security; consultation and research in the field of network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; providing information technology security services, namely, cyber-threat intelligence services, cyber-attack verification services, and security analysis of network traffic, emails, files, media computer software, and mobile applications; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments; providing information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices and generally in the field of information technology security and vulnerability; Installation and maintenance of computer programs, relating to internet security; IT services, relating to the providing of an IT computer software platform, for browsing the internet via website security authentication, in the field of businesses and/or services, namely banking and electronic commerce; IT services enabling users to have more trust in accessing the internet, via independent verification of internet browsers and feedback relating to website owner authenticity; IT services for protection against browser-based attacks and other internet security vulnerabilities, online fraud, via a subscription service enabling internet users to check the identification status and authentication logo of website owners unobtrusively and in real time; notification and delivery of Internet security software updates; Monitoring of computer systems for security purposes; software application services, relating to the provision of on-line non-downloadable software for computer security testing in the field of Internet security; Hosting web sites; computer Internet security services, namely, providing authentication, verification and validity of website identity; the issuance and management of digital secure online identification in the form of a digital authentication window, for authentication verification of a website or digital communication, or authentication of a website proprietor's digital signature and/or logo in an electronic communication and/or transaction over the Internet; IT services, namely, secure online website authentication identification software subscription services for website owners enabling internet users to check the online identification of website owners in real time; computer services, namely, the provision of online digital identification authentication, and design, development, production, implementation, testing, analysis, maintenance and consultation services for Internet security, encryption, access, authorisation, authentication verification and identification systems for computers, computer software, and/or hardware, and/or networks; Enterprise software integration; research, development, integration and operation of computer systems supporting the issuance and management of digital secure online website authentication verification, and the creation and implementation of procedures and practices for the issuance and management of digital online website authentication verification; computer related services, namely, Internet security services, being for use in secure online verification, authentication, identification, and management; technical and customer support for entities using digital online website authentication verification, and, online technical support services in relation to the aforesaid, namely, troubleshooting of computer software and hardware problems, and providing back-up computer programs and facilities; creation, organisation and maintenance of information knowledge bases in the field of Internet security; provision of technical information services in the field of Internet security software applications; dissemination and provision of information in the field of Internet security, data storage, prevention of Internet security vulnerabilities, computer viruses, computer software and hardware design, applications in security and maintenance; Consultancy relating to IT security and data security; Research services
45 Health and safety risk management; Health and safety risk assessment services; Regulatory compliance consultancy in the field of data security; Analytics relating to IT and data security

Trademark history

Date Document number Area Entry
April 4, 2023 Change Representative, Published
March 20, 2023 Change Representative, Published
October 21, 2021 Change Representative, Published

ID: 11018186090