FORTICORE

EUIPO EUIPO 2015 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark FORTICORE was filed as Word mark on 04/16/2015 at the European Union Intellectual Property Office.
It was registered as a trademark on 10/05/2017. The current status of the mark is "Trademark registered".

Trademark Details Last update: February 8, 2024

Trademark form Word mark
File reference 013958558
Application date April 16, 2015
Publication date June 12, 2015
Entry date October 5, 2017
Expiration date April 16, 2025

Trademark owner

899 Kifer Road
94086 Sunnyvale
US

Trademark representatives

Liebigstr. 39 80538 München DE

Objection / Complaint

09/11/2015: Likelihood of confusion
Applicant
Airbus DS SAS

goods and services

9 Computer hardware; computer switches; Ethernet switches; Automatic transfer switches (ATS); computer network adapters, switches, routers, servers and hubs; flow programmable switch for monitoring and controlling the flow of data, information and network traffic; computer networking hardware; telecommunications and data networking hardware, namely, devices for transporting and aggregating data, information and network traffic across multiple network infrastructures and communications protocols; computer software for controlling computer network switches; computer hardware and software for detecting, analyzing, sorting, transferring, and redirecting data, information and network traffic; computer software and firmware for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats; computer software and firmware for providing virtual private networking and security functions; network hardware, firmware and software, for managing, monitoring and maintaining networks and firewalls; computer hardware and software to promote network efficiency, security, and integrity; computer hardware and software for the analysis and reporting of network information, data and traffic; computer software for web-filtering and access control; data processing equipment; network gateway hardware; software; downloadable software; firmware; data processors; microprocessors; computer network operating systems; computer network operating system featuring network security, network management, processing of network traffic, and provision of network security; software updates; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating systems in the fields of computer intrusions, viruses, spam, or other malicious applications or threats and security functions; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for use in computer, data, network and mobile device security; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for enabling computer gateway services; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for providing network security; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for assuring, managing, processing, maintaining, and protecting the integrity of computer hardware, software, mobile devices, electronic and wireless communications, networks, electronic data, servers, applications, data, and databases; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for analyzing and filtering of network traffic; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for securing internet and communications protocol; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for monitoring, analyzing or reporting of network information, data and traffic; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for antivirus, anti-spam, anti-spyware, anti-malware, VPN (virtual private network) access security, intrusion prevention, web filtering and firewall protection; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for monitoring, logging, aggregation, collecting, analysis and reporting of network information, data and traffic and to optimize network efficiency, security and integrity; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for providing security for email, internet or other electronic communications; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for fail-open network protection; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for the management, monitoring and reporting of network firewalls and security systems; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for securing internet protocol, and for the provision of secure, mobile connectivity through a wireless access point; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating systems for use with networks, computers, servers, communications apparatus, and mobile devices; electronic software updates and associated data files for updating computer software in the fields of computer intrusions, viruses, spam, or other malicious applications or threats and security functions and for protecting the integrity of computer hardware, software, networks and electronic data; telecommunications devices and apparatus; apparatus for recording, transmission or reproduction of sound or images; computer software for detecting and repairing computer software and hardware problems; computers; all of the aforementioned for use in the fields of computers, computer software, computer services, computer security, technology security and network security
42 Computer consulting services; computer software, hardware, firmware, network and network security consulting services; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering, network management, network traffic and/or intrusion detection and prevention for network and computer security; troubleshooting of computer software, firmware, and hardware problems and technical monitoring of network systems; maintenance of computer software, namely, computer security and prevention of computer risks; testing of computer systems; computer services, namely, providing a web-based system and online portal for users to access and track customer support request tickets, to access real-time customer support service, to access technical documentation, to access troubleshooting guides, to request technical support, and to troubleshoot software, firmware, hardware, and network issues; upgrading and updating of computer software; technical support services, namely, providing reports in the fields of computer software, firmware, hardware, and network systems for diagnosing computer software, hardware, firmware and network problems; technical support services, namely, providing reports for analyzing network traffic, including, computer intrusions, viruses, spam, or other malicious applications or threats; technical support services, namely, providing reports for security functions; technical support services, namely, providing a website featuring information for diagnosing computer software, firmware, hardware, and network systems problems; technical support services, namely, providing a website featuring information for diagnosing network traffic, including, computer intrusions, viruses, spam, or other malicious applications or threats; technical support services, namely, engineering services in connection with computer software, firmware, hardware, and network systems; technical support services, namely, troubleshooting in the nature of the repair of computer software and firmware; installation, maintenance and repair of computer software and firmware; scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer software, hardware, firmware, network systems and electronic data security systems; computer consultation in the field of computer security; research in the field of intelligence and security technology; computer services, namely, cloud hosting provider services and cloud computing; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; electronic storage of reports, files, media and documents; cloud based computer services for collecting, storing, synthesizing, analyzing, and managing data and information from computer security systems; Software as a service (SAAS) services featuring software for data analysis and management, security analytics, data automation, data collection and reporting; software as a service (SAAS) services featuring software for providing cloud-based analytics for network and computer security systems; software as a service (SAAS) services featuring software for providing real-time monitoring, alerting, updating and upgrading services for network and computer security systems; software as a service (SAAS) services featuring software for monitoring network and security activity and for generating reports and statistics on such activity; software as a service (SAAS) services featuring software for allowing third parties to secure and monitor computer applications; computer services, namely, monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; computer network security management and analysis, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; all ofthe aforementioned for use in the fields of computers, computer software, computerservices, computer security, technology security and network security
45 Monitoring of computer systems for security purposes; consulting services in the field of maintaining the security and integrity of databases; monitoring of security systems; security consultancy; security services, namely, providing security assessments for businesses; all ofthe aforementioned for use in the fields of computers, computer software, computerservices, computer security, technology security and network security

Trademark history

Date Document number Area Entry
October 21, 2019 Change Representative, Published
September 26, 2016 Change Representative, Published

ID: 11013958558