CORA

EUIPO EUIPO 2024 Application under examination

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark CORA was filed as Word mark on 06/05/2024 at the European Union Intellectual Property Office. The current status of the mark is "Application under examination".

Trademark Details Last update: October 30, 2024

Trademark form Word mark
File reference 019037091
Application date June 5, 2024

Trademark owner

9 Ha'psagot St., Park Ofer 2
4951041 Petach-Tikva
IL

Trademark representatives

Leopoldstr. 4 80802 München DE

goods and services

9 Computer hardware; Computer software for use in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing real-time communication functionality for assisting with all of the foregoing; downloadable computer hardware and software manuals distributed with the foregoing
42 Providing online non-downloadable software for use in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing real-time communication functionality for assisting with all of the foregoing; online nondownloadable computer hardware and software manuals distributed with the foregoing; software as a service (SAAS) services featuring software in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing real-time communication functionality for assisting with all of the foregoing; online non downloadable computer hardware and software manuals distributed with the foregoing; platform as a service (PAAS) services featuring software for use in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing real-time communication functionality for assisting with all of the foregoing; online non-downloadable computer hardware and software manuals distributed with the foregoing

ID: 11019037091