AWAKE

WIPO WIPO 2019

Schützen Sie diese Marke vor Nachahmern!

Mit unserer Markenüberwachung werden Sie automatisch per E-Mail über Nachahmer und Trittbrettfahrer benachrichtigt.

Die Internationale Marke AWAKE wurde als Wortmarke am 16.09.2019 bei der Weltorganisation für geistiges Eigentum angemeldet.

Markendetails Letztes Update: 05. April 2023

Markenform Wortmarke
Aktenzeichen 1513081
Länder Australien Europäische Gemeinschaft Großbritannien Indien Japan Südkorea Singapur
Basismarke US Nr. , 03. November 2024
Anmeldedatum 16. September 2019
Ablaufdatum 16. September 2029

Markeninhaber

5453 Great America Parkway
Santa Clara CA 95054
US

Markenvertreter

One Maritime Plaza, 18th Floor San Francisco CA 94111 US

Waren und Dienstleistungen

09 Network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; computer software for use in protecting and managing enterprise security; computer software for digital security; computer software and software platform for monitoring enterprise networks and computer systems to protect against malicious attacks; computer software for monitoring data and communications for security purposes; computer software for protecting private information on enterprise networks; computer software for implementing computer, software and network security measures; computer software for monitoring and detecting security breaches; computer software that provides intrusion alert, threat protection and other security functions; anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software providing secure networks; computer software for security analytics; computer software for network traffic analysis; computer software for network detection and response; computer software for threat investigations and incident response; computer software for threat hunting
41 On-line journals, namely, blogs in the field of information technology security and vulnerability
42 Information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; computer consultation in the field of computer security to detect and assess information security vulnerability; computer security services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing information in the field of information technology security and vulnerability, including information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen

Markenhistorie

Datum Belegnummer Bereich Eintrag
04. April 2023 2023/14 Gaz AU Ablehnung
16. Dezember 2022 2022/52 Gaz US Korrektur
26. Januar 2022 2022/11 Gaz US RAW: Partial Ceasing Effect
01. Juni 2021 2021/22 Gaz KR Ablehnung
18. Dezember 2020 2020/52 Gaz KR Ablehnung
12. August 2020 2020/33 Gaz GB Ablehnung
23. Juni 2020 2020/26 Gaz EM Ablehnung
16. September 2019 2020/4 Gaz US Eintragung

ID: 141513081