We defuse hackers

EUIPO EUIPO 2021 Application refused

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark We defuse hackers was filed as Word mark on 07/07/2021 at the European Union Intellectual Property Office. The current status of the mark is "Application refused".

Trademark Details Last update: February 8, 2024

Trademark form Word mark
File reference 018509303
Application date July 7, 2021

Trademark owner

3 Michael Karaoli Street, Ayia Zoni
3031 Limassol
CY

Trademark representatives

4 Prometheus Street 1st floor 1065 Nicosia CY

goods and services

9 Downloadable software for cyber security, computer security and computer network security; Computer software for cyber security assessment, security hardening, vulnerability management, vulnerability assessment, vulnerability exploitation, and penetration testing; Computer software for cyber threat detection and prevention; Computer software for detection, blocking and remediation of cyber attacks; Computer software for detecting, documenting, analysing, remediating, and blocking cyber threats including trojans, worms, viruses, malware, adware, spyware, botnets, and advanced persistent threats (APTs); Computer software for monitoring, detection, and prevention of cyber security threats in computer networks, network devices, applications, electronic devices, computer systems; Computer software for computer and computer network intrusion detection and intrusion prevention; Computer software and hardware for digital security; Computer software for network security, computer security, information security, data security, cyber threat intelligence, cyber threat prevention, computer surveillance, network surveillance, network traffic monitoring
42 Software As a Service (SAAS) and non-downloadable cloud based software in the fields of cyber security, computer security and computer network security; Technical advisory and consulting services in the field of cyber security, external network penetration testing, internal network penetration testing, web application penetration testing, wireless penetration testing, mobile application penetration testing, physical penetration testing, hardware penetration testing, Payment Card Industry (PCI) compliance reviews, computer security assessments, computer network security assessments, computer hardware security assessments; Managed cyber security services, namely, intrusion detection, intrusion prevention, cyber security threat detection and prevention, network traffic monitoring for cyber security purposes; Implementation and integration of technology solutions in the field of cyber security namely IT security, protection and restoration, computer security system monitoring services, provision of security services for computer networks, computer access and computerised transactions and maintenance of computer software relating to computer security and prevention of computer risks; Computer security consultancy in the field of security assessment and penetration testing of computers, network devices, servers, desktops, computer networks to assess information security vulnerability; Advisory, information and consulting services in the fields of cyber security, network security, data security, computer security; Providing temporary use of non downloadable cloud-based software for cyber security, computer security and computer network security; Computer technology support services, namely, providing remote service desk and cyber security helpdesk services; Managed computer security services delivered through security operations centre's, namely, managing and optimizing computer security software for security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention (DLP), application security, endpoint security, and forensics and incident response; Software As a Service (SAAS) services featuring cyber security software for computer and network security assessment, vulnerability assessment and vulnerability management; Research and implementation of cyber security software for computer network and application security, vulnerability assessment, vulnerability exploitation, threat detection and threat prevention; Research and development of computer software in the fields of cyber security, computer security, data and information security, and computer network security; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; Providing a web site featuring information about cyber security

ID: 11018509303