PENTERA

EUIPO EUIPO 2022 Application opposed

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark PENTERA was filed as Word mark on 12/08/2022 at the European Union Intellectual Property Office. The current status of the mark is "Application opposed".

Trademark Details Last update: Today

Trademark form Word mark
File reference 018806553
Application date December 8, 2022
Publication date January 25, 2023

Trademark owner

94 Derech Em Hamoshavot
4970602 Petach Tikva
IL

Trademark representatives

Avenue Louise 235 1050 Bruxelles BE

Objection / Complaint

04/21/2023: Likelihood of confusion
Trademark
Applicant
HACKER Consulting s.r.o.

goods and services

9 Downloadable computer software for analyzing and preventing threats in the fields of computer, data, internet website, and network security; downloadable computer threat analysis software for protecting data; downloadable computer software assessing information technology security and vulnerability of computers and networks, and conducting network security audits, including, data breach threat analysis, database security analysis, firewall audits and penetration testing; downloadable computer software for testing and validation of the organization's security controls; downloadable computer software for emulating cyber-security breaches and recommending mitigation strategies; downloadable computer software for predicting and preventing computer security issues prior to them occurring; downloadable computer software for monitoring and managing the security and integrity of information systems, local area networks, intranets, global computer networks and the internet; downloadable computer software for conducting security audits in the fields of computer, data, internet website, and network security, and reporting the results of such audits
42 Software as a service (SaaS) featuring software for use in computer, data, internet website, and network security; software as a service (SaaS) featuring software to detect and analyze computer, data, internet website, and network security; Software as a service (SaaS) providing online non-downloadable software for use in software application, management and maintenance in the field of computer, data, internet website, and network security and cyber security defense; Software as a service (SaaS) providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability; performing a comprehensive inventory count of internet-facing assets; categorizing internet-assets by types, such as databases, servers, routers, or switches; Software as a service (SaaS) providing non-downloadable computer programs for testing of security systems; computer security threat analysis for protecting data; assessing information technology security and vulnerability of computers and networks; computer security services (testing and risk assessment of computer networks); software as a service (SaaS) providing non-downloadable computer programs for cyber surveillance, for identifying information systems' security vulnerability, for maintaining the security and integrity of computer networks and data storage facilities, for real-time analysis of security alerts and for defending against data breaches and privacy violations; Software as a service (SaaS) for conducting network intrusion protection testing and for vulnerability management and assessment, risk management and assessment, data breach threat analysis and network threat analysis; software as a service (SaaS) providing non-downloadable computer programs for conducting network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing of internet-accessible assets (hardware, software, etc.) and assessing the priority of internet-facing assets of a customer to potential attackers; computer programming and maintenance of computer programs in the field of computer, data, internet website, and network security and cyber security defense

Trademark history

Date Document number Area Entry
October 3, 2023 Change Representative, Registered

ID: 11018806553