Sophos Adaptive Cybersecurity Ecosystem

EUIPO EUIPO 2022 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark Sophos Adaptive Cybersecurity Ecosystem was filed as Word mark on 01/21/2022 at the European Union Intellectual Property Office.
It was registered as a trademark on 06/01/2022. The current status of the mark is "Trademark registered".

Trademark Details Last update: June 3, 2022

Trademark form Word mark
File reference 018642654
Application date January 21, 2022
Publication date February 22, 2022
Entry date June 1, 2022
Expiration date January 21, 2032

Trademark owner

The Pentagon, Abingdon Science Park
OX14 3YP Abingdon
GB

Trademark representatives

55, rue des Bruyères 1274 Howald LU

goods and services

9 Downloadable security software to provide cybersecurity protection; computer hardware; wireless access points; network security firewall appliances; wireless network routers; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; downloadable electronic publications and data in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases; parts, fittings and accessories for all of the aforesaid goods
42 Computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer consulting services; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; IT security, protection and restoration; computer security system monitoring services; research relating to security; data security consultancy; internet security consultancy; design and development of computer security software designed to provide cybersecurity protection; providing a software platform for cloud infrastructure security; artificial intelligence and analytics-based testing, monitoring and inspection of cybersecurity protection software; artificial intelligence and analytics-based computer security threat analysis for protecting data; computer security consultancy in the field of protection of cloud-based computer security software; providing cyberattack protection and real-time threat prevention through artificial intelligence and analytics data; information, consultancy and advisory services relating to the aforesaid

ID: 11018642654