CLOUD ENTITLEMENTS MANAGER

EUIPO EUIPO 2020 Application refused

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark CLOUD ENTITLEMENTS MANAGER was filed as Word mark on 11/05/2020 at the European Union Intellectual Property Office. The current status of the mark is "Application refused".

Trademark Details Last update: February 8, 2024

Trademark form Word mark
File reference 018332653
Application date November 5, 2020

Trademark owner

9 Ha'psagot St., Park Ofer 2
4951041 Petach-Tikva
IL

Trademark representatives

Via Porlezza 12 20123 Milano IT

goods and services

9 Downloadable computer software featuring software: for managing access control settings for Information Technology infrastructure, for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, for auditing and monitoring computer systems, computer system resources, human and non-human user activity, for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, for implementing least privilege access across computer networks network and cloud environments, for utilizing Artificial- Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, for integrating with privileged access management solutions and for securing computer networks and cloud resources; and downloadable electronic computer manuals distributed with the foregoing goods
42 Software as a service (SAAS) services featuring software: for managing access control settings for Information Technology infrastructure, for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, for auditing and monitoring computer systems, computer system resources, human and non-human user activity, for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, for implementing least privilege access across computer networks network and cloud environments, for utilizing Artificial- Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, for integrating with privileged access management solutions and for securing computer networks and cloud resources; and consulting, advisory, and information services relating to products and services in the foregoing fields

ID: 11018332653