SOPHOS Cybersecurity Delivered.

EUIPO EUIPO 2022 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark SOPHOS Cybersecurity Delivered. was filed as Figurative mark on 03/16/2022 at the European Union Intellectual Property Office.
It was registered as a trademark on 11/08/2022. The current status of the mark is "Trademark registered".

Logodesign (Wiener Klassifikation)

#Letters presenting a special form of writing

Trademark Details Last update: February 14, 2023

Trademark form Figurative mark
File reference 018673180
Application date March 16, 2022
Publication date August 1, 2022
Entry date November 8, 2022
Expiration date March 16, 2032

Trademark owner

The Pentagon, Abingdon Science Park
OX14 3YP Abingdon
GB

Trademark representatives

55, rue des Bruyères 1274 Howald LU

goods and services

9 Computer hardware; wireless access points; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; network monitoring hardware and software; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; downloadable computer software for IT infrastructure and cybersecurity automation; downloadable electronic publications and data in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases; parts, fittings and accessories for all of the aforesaid goods
16 Paper and cardboard; printed matter; stationery; office requisites (except furniture); instructional and teaching material (except apparatus); plastic materials for packaging; parts, fittings and accessories for all of the aforesaid goods
21 Containers; drinking vessels and containers; water bottles; lunch boxes; food storage containers; parts, fittings and accessories for all of the aforesaid goods
25 Clothing; footwear; headgear; parts, fittings and accessories for all of the aforesaid goods
28 Toys; games and playthings; gymnastic and sporting articles; surfboards; skateboards; flying discs; parts, fittings and accessories for all of the aforesaid goods
35 Business intelligence services; business data analysis services; business research and advisory services; business advisory services in connection with IT security; administration of a program for enabling participants to receive expedited services in the field of data security, computer security, and network security; business administration services; customer service management for others; promoting the use of the security assurance best practices of others in the field of cloud computing; retail services connected with the sale of software and hardware; Retail services connected with the sale of computer hardware and computer software via a distributorship; database management; wholesale services connected with the sale of computer hardware and computer software via a distributorship; information, consultancy and advisory services relating to the aforesaid
37 Installation, maintenance and repair of computer hardware; troubleshooting in the nature of the repair of computer hardware; information, consultancy and advisory services relating to the aforesaid
38 Telecommunication access services; telecommunications services; providing virtual private network (VPN) services; private and secure electronic communications over a private or public computer network; secure telecommunication services; providing access to computer networks over telecommunications networks; providing access between computers and computer networks over telecommunications networks; providing access between computer networks and servers over telecommunications networks; providing access between computers and servers over telecommunications networks; communications by computer terminals; transmission of messages and images by computers; electronic transmission of data over telecommunications networks; information, consultancy and advisory services relating to the aforesaid
41 Education; providing of training; educational services; conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith; information, consultancy and advisory services relating to the aforesaid
42 Software authoring; computer services for the protection of software; data security services; computer software technical support services; troubleshooting of computer software problems; technical advice related to computer and network security; installation, maintenance and repair of computer software; computer security consultancy; computer consulting services; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; technology consulting services in the field of cloud computing; technology consulting services in the field of cybersecurity; technology consulting services in the field of IT infrastructure and cybersecurity automation; providing a website in connection with information in the field of security; providing a website used to place on-line commercial orders in the field of computer hardware and computer software; tracking, monitoring, and reporting for purposes of protecting against data theft, identity theft and fraud; anti-spamming services to assist in the prevention of unsolicited commercial communications; information, consultancy and advisory services relating to the aforesaid
45 Providing online legal information in the field of privacy and data security; consultancy in the field of data theft and identity theft; identity verification services; identity validation services; identity theft detection and protection services; fraud protection services; providing authentication of personal identification information [identification verification services]; consultation in the field of data theft and identity theft; monitoring reports concerning larger scale consumer data security breaches for fraud protection purposes; monitoring personal financial account activities for atypical activities for fraud protection services; information, consultancy and advisory services relating to all of the aforesaid

ID: 11018673180