WIPO WIPO 2017

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The International trademark was filed as Figurative mark on 01/30/2017 at the World Intellectual Property Organization.

Logodesign (Wiener Klassifikation)

#Quadrilaterals #Other irregular parallelograms, trapezia and quadrilaterals, quadrilaterals containing one or more rounded corners #Several quadrilaterals juxtaposed, joined or intersecting #Quadrilaterals with dark surfaces or parts of surfaces

Trademark Details Last update: November 4, 2022

Trademark form Figurative mark
File reference 1338561
Countries China em India Japan Singapore
Base trademark US No. , August 9, 2024
Application date January 30, 2017
Expiration date January 30, 2027

Trademark owner

595 Market Street, Suite 1300
San Francisco CA 94105
US

Trademark representatives

100 Pine Street, Suite 1250 US

goods and services

09 Downloadable software for computer security; downloadable software in the field of information security management systems for information technology (IT) infrastructure and systems security, for user and entity behavioral analytics, predictive analytics for computer and network security, profiling and analyzing users, endpoints, applications and other entities independently and then correlates the data to identify threats, prioritize alerts, and communicate relevant information to the appropriate stakeholders, identifying anomalies in privileged user access, insight into third party vendor behavior, and intelligence about vulnerabilities within organizations' attack surface, detection, blocking, and facilitating removal and remediation of cyber-attacks, malicious attacks, insider threats, outsider threats, anomalous user behavior, compromised end points, compromised users, exploitable assets susceptible to threats, privilege account abuse, observed privilege activity, data exfiltration, phishing, bots, time bombs, worms, and advanced persistent threats, identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices, providing remediation and responder portal, providing just-in-time awareness training modules that personalize cyber education to change user behavior and shift the culture of the organization, providing executive dashboards and security self-service portals for cyber risk management, predicting and stopping crime before it happens by identifying, analyzing and correlating risky behavior and vulnerabilities across five vectors - insiders (employees), outsiders (bad actors), high privilege accounts, third party vendors and businesses' most valuable assets including who has access to them, and prioritizing the potential threats and security risk coming in through modern cyber threat vectors such as users, systems, applications, and vendors
42 Computer consultation; computer programming for others; computer project management services; computer services in the nature of customized web pages featuring user-defined information, personal profiles and information; computer software consultancy; computer software consultation; computer software design for others; computer software design, computer programming, or maintenance of computer software; computer software development; consultancy in the field of software design; consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; data conversion of computer program data or information; design, development and implementation of software; development, updating and maintenance of software and database systems; installation of computer software; periodic upgrading of computer software for others; providing customized computer searching services, namely, searching and retrieving information at the customer's specific request via telephone or global computer networks; technical support services, namely, troubleshooting of computer software problems; technical support services, namely, troubleshooting of industrial process control computer software problems; up-dating of computer software; updating of computer programs for third parties

Trademark history

Date Document number Area Entry
June 27, 2018 2018/27 Gaz CN Rejection
November 30, 2017 2017/49 Gaz JP RAW: Rule 18ter(2)(ii) GP following a provisional refusal
October 30, 2017 2017/44 Gaz IN Rejection
September 22, 2017 2017/38 Gaz SG Rejection
September 19, 2017 2017/38 Gaz EM Rejection
July 20, 2017 2017/29 Gaz JP Rejection
January 30, 2017 2017/13 Gaz US Registration

ID: 141338561