FIREBOX

WIPO WIPO 2020

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The International trademark FIREBOX was filed as Word mark on 09/25/2020 at the World Intellectual Property Organization.

Trademark Details Last update: April 10, 2023

Trademark form Word mark
File reference 1560183
Countries Australia Brazil Canada China Indonesia India Japan South Korea Mexico Norway New Zealand Singapore
Base trademark US No. , March 23, 2025
Application date September 25, 2020
Expiration date September 25, 2030

Trademark owner

505 5TH AVE S, SUITE 500
SEATTLE WA 98104
US

Trademark representatives

3150 Porter Dr. Palo Alto CA 94304 US

goods and services

09 Computer hardware; computer hardware for management of computer networks, wireless networks, and endpoint security; computer servers used for network security and management; downloadable computer software for network security, namely, firewall, unified threat management and virtual private network capabilities in the fields of security monitoring, identification of malware and spam, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks, and manuals sold as a unit; recorded and downloadable computer software for management of computer networks and wireless access points; recorded and downloadable computer software for management of traffic on computer networks; recorded and downloadable computer software for management of other computer applications on a computer network; recorded and downloadable computer software providing a graphical user interface for management of networked servers; recorded and downloadable computer software for management and analysis of use of wireless networks by users; recorded and downloadable computer software used for protection and management of confidential data and personally identifiable information; recorded and downloadable computer database management software for enabling secure access to stored data, providing data storage options, and for identifying and reporting network security threats, issues, and trends; recorded and downloadable computer software enabling users to set security policies for computer networks and network administration tasks; recorded and downloadable computer software for use in providing network security alerts; recorded and downloadable computer network management software for use in providing historical reports of jitter, packet loss, and latency, allowing administrators to better troubleshoot network connections
42 Technical support for computer system access and security services, namely, remote and on-site monitoring of technological functions of local area, wide area, and global computer network systems and providing backup computer programs and facilities in the areas of security, access control, information flow control, and computer connection; computer security services, namely, restricting unauthorized access to computer networks; providing online non-downloadable software for use in identifying malware attacks; providing online non-downloadable software for use in detecting malicious websites, botnets, and wireless access points; providing online non-downloadable software for use in managing traffic on a computer network; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; providing online non-downloadable software for management of computer software applications on a user's network; providing online non-downloadable computer software for visualization of connected devices and wireless access points; providing online non-downloadable software for monitoring, managing, and anonymizing personally identifying information and protecting confidential data on computer networks; computer security consulting services in the field of threat detection; computer security services, namely, preventing unwanted access and identification of malware and spam; computer security services, namely, monitoring of computer systems for purposes of detecting and reporting network security threats, issues, and trends; providing online, non-downloadable cloud based software enabling users to set security policies for computer networks and network administration tasks; providing online non-downloadable software for use in providing network security alerts; providing online non-downloadable computer network management software for use in providing historical reports of jitter, packet loss, and latency, allowing administrators to better troubleshoot network connections

Trademark history

Date Document number Area Entry
March 29, 2023 2023/14 Gaz CA RAW: Rule 18ter(2)(ii) GP following a provisional refusal
August 19, 2022 2022/34 Gaz JP RAW: Rule 18ter(2)(ii) GP following a provisional refusal
April 29, 2022 2022/17 Gaz MX Rejection
March 10, 2022 2022/11 Gaz CA Rejection
February 16, 2022 2022/7 Gaz KR Rejection
October 26, 2021 2021/43 Gaz BR Rejection
October 14, 2021 2021/47 Gaz JP Rejection
October 7, 2021 2021/40 Gaz NO Rejection
September 1, 2021 2021/35 Gaz ID Rejection
August 3, 2021 2021/31 Gaz NZ Rejection
July 16, 2021 2021/33 Gaz SG RAW: Rule 18ter(2)(ii) GP following a provisional refusal
April 23, 2021 2021/17 Gaz AU RAW: Rule 18ter(2)(i) GP following a provisional refusal
March 9, 2021 2021/11 Gaz CN Rejection
January 20, 2021 2021/4 Gaz SG Rejection
December 8, 2020 2020/51 Gaz AU Rejection
December 1, 2020 2020/50 Gaz IN Rejection
September 25, 2020 2020/44 Gaz US Registration

ID: 141560183