TAUSIGHT

WIPO WIPO 2020

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The International trademark TAUSIGHT was filed as Word mark on 12/01/2020 at the World Intellectual Property Organization.

Trademark Details Last update: March 24, 2023

Trademark form Word mark
File reference 1587739
Countries Australia Canada China European Community United Kingdom Japan New Zealand Singapore
Base trademark US No. 88943563, June 2, 2020
Application date December 1, 2020
Expiration date December 1, 2030

Trademark owner

200 Portland Street, Suite 500
Boston MA 02114
US

Trademark representatives

One Federal Street Boston MA 02110 US

goods and services

09 Downloadable computer software for identifying and evaluating cyber security and information security risks, and monitoring and protecting computer networks; downloadable computer software used for scanning and securing internet websites; downloadable software which allows users to identify information and website security vulnerability and cyber vulnerability; downloadable software for use with secure network and internet operations enabling users to review, manage, test, and analyze website security vulnerability, cyber vulnerability, cyber security analysis, and cyber security reporting; downloadable software which allows users to test websites for security and usability and receive security analysis and reports; downloadable software for ensuring the security of websites and their supporting platforms and services; downloadable computer anti-virus and security software; downloadable software for computer security, security compliance reporting, security intelligence and log management; downloadable cyber security computer software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks related to computer security; downloadable software for assessing cyber security threats in information technology infrastructure and computer network systems; downloadable software for testing the effectiveness of cyber security methods and systems in enterprises; downloadable computer software in the field of cyber security vulnerability testing of connected devices; downloadable mobile application software for identifying and evaluating cyber security and information security risks, and monitoring and protecting computer networks, scanning and securing internet websites, identifying information and website security vulnerability and cyber vulnerability; downloadable mobile application software for review, manage, test, and analyze website security vulnerability, cyber vulnerability, cyber security analysis, and cyber security reporting; downloadable mobile application software for testing websites for security and usability and receive security analysis and reports, computer security, security compliance reporting, security intelligence and log management, and for assessing cyber security threats in information technology infrastructure and computer network systems; downloadable computer software in the field of cyber security vulnerability testing of connected devices
42 Computer forensics services; computer, internet and data security consultancy services; design and development of electronic data security systems and software for secure network operations; computer security threat analysis for protecting data; computer security and cyber security consulting services; computer security consultation relating to fraud detection in the field of data theft, cyber threats, and cybercrime in the fields of computer networks security and cybersecurity; electronic monitoring services for computer security threat analysis in the nature of incident response teams that provide monitoring of network systems, servers and web and database applications and notification of related events and alerts in the fields of computer networks security and cybersecurity; computer security consultation services in the field of cybersecurity featuring deception network services for monitoring and protecting computer networks for others, providing cyber security and information security diligence and solutions for others, collecting and aggregating data and intelligence; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities; providing temporary use of non-downloadable computer software for identifying and evaluating cyber security and information security risks, and monitoring and protecting computer networks; providing temporary use of non-downloadable computer software used for scanning and securing internet websites; providing temporary use of non-downloadable software which allows users to identify information and website security vulnerability and cyber vulnerability; providing temporary use of non-downloadable software for use with secure network and internet operations enabling users to review, manage, test, and analyze website security vulnerability, cyber vulnerability, cyber security analysis, and cyber security reporting; providing temporary use of non-downloadable software which allows users to test websites for security and usability and receive security analysis and reports; providing temporary use of non-downloadable software for ensuring the security of websites and their supporting platforms and services; providing temporary use of non-downloadable computer anti-virus and security software; providing temporary use of non-downloadable software for computer security, security compliance reporting, security intelligence and log management; providing temporary use of non-downloadable cyber security computer software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks related to computer security; providing temporary use of non-downloadable software for assessing cyber security threats in information technology infrastructure and computer network systems; providing temporary use of non-downloadable software for testing the effectiveness of cyber security methods and systems in enterprises

Trademark history

Date Document number Area Entry
February 22, 2023 2023/12 Gaz US RAW: Partial Ceasing Effect
February 16, 2023 2023/7 Gaz JP Rejection
November 30, 2022 2023/4 Gaz CA Rejection
March 3, 2022 2022/9 Gaz JP Rejection
November 18, 2021 2021/46 Gaz SG Rejection
November 2, 2021 2021/44 Gaz NZ Rejection
September 15, 2021 2021/37 Gaz CN Rejection
September 8, 2021 2021/36 Gaz EM Rejection
September 1, 2021 2021/35 Gaz GB Rejection
July 7, 2021 2021/27 Gaz AU Rejection
December 1, 2020 2021/14 Gaz US Registration

ID: 141587739