LOOKOUT

EUIPO EUIPO 2023 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark LOOKOUT was filed as Word mark on 02/16/2023 at the European Union Intellectual Property Office.
It was registered as a trademark on 08/10/2023. The current status of the mark is "Trademark registered".

Trademark Details Last update: May 15, 2024

Trademark form Word mark
File reference 018837076
Application date February 16, 2023
Publication date May 3, 2023
Entry date August 10, 2023
Expiration date February 16, 2033

Trademark owner

275 Battery St
94111 San Francisco
US

Trademark representatives

Suite 308, The Merrion Buildings, 18-20 Merrion Street Upper, D02 XH98 Dublin 2 IE

goods and services

9 downloadable computer software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data, for securing data during access to a computer network,for securing connectivity to a computer network, for securing computing hardware and software located at the edge of a network,for blocking access to and from malicious websites and links, for secure remote access to a network, for on-premises or cloud-based security policy enforcement,for capturing, storing, presenting credentials for authentication to multiple computer services,for enterprise digital rights management and for phishing and content protection
42 Providing online non-downloadable software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection, for detecting and mitigating security threats directed toward users, endpoints, applications and data; Providing online non-downloadable software for identifying and protecting data which is transmitted in electronic form or otherwise, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links, for secure remote access to a network; Providing online non-downloadable software for identifying and protecting data which is transmitted in electronic form or otherwise, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Software as a Service (SaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection, for detecting and mitigating security threats directed toward users, endpoints, applications and data; Software as a Service (SaaS) featuring software for identifying data which is transmitted in electronic form or otherwise, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links, for secure remote access to a network; Software as a Service (SaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Connectivity as a Service (CaaS) featuring software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Connectivity as a Service (CaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise for detecting and mitigating security threats directed toward users, endpoints, applications and data, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links; Connectivity as a Service (CaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise for secure remote access to a network, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Platform as a Service (PaaS) featuring software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection, for detecting and mitigating security threats directed toward users, endpoints, applications and data; Platform as a Service (PaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links, for secure remote access to a network; Platform as a Service (PaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Hardware as a Service (HaaS), namely, providing a software-defined wide area network (SD-WAN) and software-defined web gateway; Computer consultancy services, namely, computer software consultancy, computer technology consultancy

ID: 11018837076