DRAGOS

EUIPO EUIPO 2020 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark DRAGOS was filed as Figurative mark on 12/02/2020 at the European Union Intellectual Property Office.
It was registered as a trademark on 05/31/2021. The current status of the mark is "Trademark registered".

Logodesign (Wiener Klassifikation)

#Dragons #Letters crossed or barred by letters, numerals or a figurative element

Trademark Details Last update: October 15, 2024

Trademark form Figurative mark
File reference 018348238
Application date December 2, 2020
Publication date February 19, 2021
Entry date May 31, 2021
Expiration date December 2, 2030

Trademark owner

1745 Dorsey Rd., Suite R
21076 Hanover
US

Trademark representatives

2 Dublin Landings, North Wall Quay Dublin 1 IE

goods and services

9 Software; Downloadable and recorded software; Cybersecurity software; Downloadable and recorded software for providing network, Internet, and computer security; Downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; Downloadable and recorded software for the encryption and authentication of electronic and digital information and data; Downloadable and recorded computer software for identity security; Downloadable and recorded software for authentication and identity management information security; Downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Downloadable and recorded software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Downloadable electronic data files featuring data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; Computer hardware; Optical and image sensor hardware; Computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Sensors for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices
41 Educational services; Educational services in the field of cybersecurity; Training services in the field of cybersecurity; Providing online, non-downloadable educational publications, articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity
42 Software as a service (SaaS) services; Platform as a service (PaaS) services; Software as a service (SaaS) services featuring cybersecurity software; Platform as a service (PaaS) services featuring cybersecurity software; provision of non-downloadable software in relation to network, Internet and computer security; development and design of non-downloadable software in relation to network, Internet and computer security; provision of non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; design and development of non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; provision of non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; design and development of non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; provision of non-downloadable software for the encryption and authentication of electronic and digital information and data; design and development of non-downloadable software for the encryption and authentication of electronic and digital information and data; provision of non-downloadable software for identity security; design and development of non-downloadable software for identity security; provision of non-downloadable software for authentication and identity management information security; design and development of non-downloadable software for authentication and identity management information security; provision of non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; design and development of non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; provision of non-downloadable software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; design and development of non-downloadable software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; Providing an online portal for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing an online portal for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; electronic storage of data; Information technology consulting services; Consulting services in the field of cybersecurity; Consulting services in the field of management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; Providing information concerning the encryption and authentication of electronic and digital data; Authentication, issuance and validation of digital certificates; Issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; Design, development, installation, and customization of software; Design and development of cybersecurity systems; Development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; Updating of computer software; Computer diagnostic services; Technical support services; Technical support services in the nature of monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues; Technical support services in the nature of architecture reviews, vulnerability assessments, device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices; Computer software services, namely, software as a service (SaaS) services featuring software for use in the monitoring, evaluation, control and security of computer systems, industrial control systems, and networked devices; computer software services, namely, software as a service (SaaS) services featuring software for security monitoring, and security and dysfunction incident remediation; Monitoring of computer systems, industrial control systems, and networked devices for security purposes; Monitoring and tracking of security vulnerabilities and problems in computer software products and computer networks; Investigation of security threats to computer systems, industrial control systems, and networked devices for security purposes; Investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for security purposes; Computer emergency response team services, namely, monitoring, tracking, and investigation of security vulnerabilities and problems in computer software products and computer networks
45 Electronic monitoring services for security purposes; private investigation services

Trademark history

Date Document number Area Entry
August 7, 2024 Change Representative, Published
October 14, 2021 Change Representative, Published
June 7, 2021 Change Representative, Published

ID: 11018348238