SECMENTIS

EUIPO EUIPO 2020 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark SECMENTIS was filed as Word mark on 02/04/2020 at the European Union Intellectual Property Office.
It was registered as a trademark on 05/29/2020. The current status of the mark is "Trademark registered".

Trademark Details Last update: February 8, 2024

Trademark form Word mark
File reference 018191409
Application date February 4, 2020
Publication date February 19, 2020
Entry date May 29, 2020
Expiration date February 4, 2030

Trademark owner

3 Michael Karaoli Street, Ayia Zoni
3031 Limassol
CY

Trademark representatives

4 Prometheus Street 1st floor 1065 Nicosia CY

goods and services

9 Downloadable software for cyber security, computer security and computer network security; Computer software for cyber security assessment, security hardening, vulnerability management, vulnerability assessment, vulnerability exploitation, and penetration testing; Computer software for cyber threat detection and prevention; Computer software for detection, blocking and remediation of cyber attacks; Computer software for detecting, documenting, analyzing, remediating, and blocking cyber threats including trojans, worms, viruses, malware, adware, spyware, botnets, and advanced persistent threats (APTs); Computer software for monitoring, detection, and prevention of cyber security threats in computer networks, network devices, applications, electronic devices, computer systems; Computer software for computer and computer network intrusion detection and intrusion prevention; Computer software and hardware for digital security; Computer software for network security, computer security, information security, data security, cyber threat intelligence, cyber threat prevention, computer surveillance, network surveillance, network traffic monitoring; none of the foregoing relating to software for use in business fields for the purpose of driving decision making and improving business operations, performance and strategy
42 Software As a Service (SAAS) and non-downloadable cloud-based software in the fields of cyber security, computer security and computer network security; Technical advisory and consulting services in the field of cyber security, external network penetration testing, internal network penetration testing, web application penetration testing, wireless penetration testing, mobile application penetration testing, physical penetration testing, hardware penetration testing, Payment Card Industry (PCI) compliance reviews, computer security assessments, computer network security assessments, computer hardware security assessments; Managed cyber security services, namely, intrusion detection, intrusion prevention, cyber security threat detection and prevention, network traffic monitoring for cyber security purposes; Implementation and integration of technology solutions in the field of cyber security; Computer security consultancy in the field of security assessment and penetration testing of computers, network devices, servers, desktops, computer networks to assess information security vulnerability; Advisory, information and consulting services in the fields of cyber security, network security, data security, computer security; Providing temporary use of non-downloadable cloud-based software for cyber security, computer security and computer network security; Computer technology support services, namely, providing remote service desk and cyber security helpdesk services; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software for security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention (DLP), application security, endpoint security, and forensics and incident response; Software As a Service (SAAS) services featuring cyber security software for computer and network security assessment, vulnerability assessment and vulnerability management; Research and implementation of cyber security software for computer network and application security, vulnerability assessment, vulnerability exploitation, threat detection and threat prevention; Research and development of computer software in the fields of cyber security, computer security, data and information security, and computer network security; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; Providing a web site featuring information about cyber security; none of the foregoing relating to software for use in business fields for the purpose of driving decision making and improving business operations, performance and strategy

ID: 11018191409