WIPO WIPO 2017

Schützen Sie diese Marke vor Nachahmern!

Mit unserer Markenüberwachung werden Sie automatisch per E-Mail über Nachahmer und Trittbrettfahrer benachrichtigt.

Die Internationale Marke wurde als Bildmarke am 30.01.2017 bei der Weltorganisation für geistiges Eigentum angemeldet.

Logodesign (Wiener Klassifikation)

#Quadrilateralen #Andere unregelmäßige Parallelogramme, Trapezien und Vierecke, Vierecke mit einer oder mehreren abgerundeten Ecken #Mehrere Vierecke nebeneinander, verbunden oder sich überschneidend #Quadrilaterale mit dunklen Flächen oder Teilen von Flächen

Markendetails Letztes Update: 04. November 2022

Markenform Bildmarke
Aktenzeichen 1338561
Länder China Europäische Gemeinschaft Indien Japan Singapur
Basismarke US Nr. , 13. Juli 2024
Anmeldedatum 30. Januar 2017
Ablaufdatum 30. Januar 2027

Markeninhaber

595 Market Street, Suite 1300
San Francisco CA 94105
US

Markenvertreter

100 Pine Street, Suite 1250 US

Waren und Dienstleistungen

09 Downloadable software for computer security; downloadable software in the field of information security management systems for information technology (IT) infrastructure and systems security, for user and entity behavioral analytics, predictive analytics for computer and network security, profiling and analyzing users, endpoints, applications and other entities independently and then correlates the data to identify threats, prioritize alerts, and communicate relevant information to the appropriate stakeholders, identifying anomalies in privileged user access, insight into third party vendor behavior, and intelligence about vulnerabilities within organizations' attack surface, detection, blocking, and facilitating removal and remediation of cyber-attacks, malicious attacks, insider threats, outsider threats, anomalous user behavior, compromised end points, compromised users, exploitable assets susceptible to threats, privilege account abuse, observed privilege activity, data exfiltration, phishing, bots, time bombs, worms, and advanced persistent threats, identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices, providing remediation and responder portal, providing just-in-time awareness training modules that personalize cyber education to change user behavior and shift the culture of the organization, providing executive dashboards and security self-service portals for cyber risk management, predicting and stopping crime before it happens by identifying, analyzing and correlating risky behavior and vulnerabilities across five vectors - insiders (employees), outsiders (bad actors), high privilege accounts, third party vendors and businesses' most valuable assets including who has access to them, and prioritizing the potential threats and security risk coming in through modern cyber threat vectors such as users, systems, applications, and vendors
42 Computer consultation; computer programming for others; computer project management services; computer services in the nature of customized web pages featuring user-defined information, personal profiles and information; computer software consultancy; computer software consultation; computer software design for others; computer software design, computer programming, or maintenance of computer software; computer software development; consultancy in the field of software design; consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; data conversion of computer program data or information; design, development and implementation of software; development, updating and maintenance of software and database systems; installation of computer software; periodic upgrading of computer software for others; providing customized computer searching services, namely, searching and retrieving information at the customer's specific request via telephone or global computer networks; technical support services, namely, troubleshooting of computer software problems; technical support services, namely, troubleshooting of industrial process control computer software problems; up-dating of computer software; updating of computer programs for third parties
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen

Markenhistorie

Datum Belegnummer Bereich Eintrag
27. Juni 2018 2018/27 Gaz CN Ablehnung
30. November 2017 2017/49 Gaz JP RAW: Rule 18ter(2)(ii) GP following a provisional refusal
30. Oktober 2017 2017/44 Gaz IN Ablehnung
22. September 2017 2017/38 Gaz SG Ablehnung
19. September 2017 2017/38 Gaz EM Ablehnung
20. Juli 2017 2017/29 Gaz JP Ablehnung
30. Januar 2017 2017/13 Gaz US Eintragung

ID: 141338561