APPGATE

WIPO WIPO 2020

Schützen Sie diese Marke vor Nachahmern!

Mit unserer Markenüberwachung werden Sie automatisch per E-Mail über Nachahmer und Trittbrettfahrer benachrichtigt.

Die Internationale Marke APPGATE wurde als Wortmarke am 27.03.2020 bei der Weltorganisation für geistiges Eigentum angemeldet.

Markendetails Letztes Update: 27. Juli 2023

Markenform Wortmarke
Aktenzeichen 1574768
Länder Kanada Kolumbien Europäische Gemeinschaft Großbritannien Japan
Basismarke US Nr. 88680767, 05. November 2019
Anmeldedatum 27. März 2020
Ablaufdatum 27. März 2030

Markeninhaber

Two Alhambra Plaza, Suite PH-1-B
Coral Gables FL 33134
US

Markenvertreter

City Tower, 40 Basinghall Street GB

Waren und Dienstleistungen

09 Downloadable computer search engine software; downloadable enterprise software in the nature of a database for non-transactional data and a search engine for database content; downloadable computer software for network security assessment and testing; downloadable computer software for information security analysis, namely, forensic and auditing software used to determine security weakness in software and software applications; downloadable electronic fraud and identity theft protection computer software; downloadable software for online fraud protection, namely, providing safe browsing to users in e-commerce transactions, online financial transactions and online communications; downloadable software for identifying and authenticating users in e-commerce transactions, online financial transactions and online communications; pre-recorded computer software for fraud protection by providing safe browsing to users in e-commerce transactions, online financial transactions and online communications, recorded on a usb flash drive; downloadable computer software in the field of data security for secure network access, data and software security, encryption; downloadable content compliance and governance computer software, namely, downloadable enterprise test management software to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies; downloadable computer software for use in document, data and information security, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; recorded computer software for computer network security and accessing computer networks; downloadable computer software for verifying and correcting web-sites to meet federal accessibility standards software for use in data security for secure network access, data and software security, encryption, content compliance and governance; recorded software for use in compliance management and risk analysis in the fields of computer and network security; recorded computer software for use in the field of computer security; downloadable software for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decisioning software systems; downloadable computer software for data analytics, comprehensive data processing, visual analytics, machine learning and document production for use in digital investigations, e-discovery, intelligence mining and corporate communication compliance
35 Providing consumer and business information in the field of telecommunications products and services
38 Telecommunications services, namely, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks; telecommunications services, namely, providing network access points (NAPs); providing multiple-user access to a global computer network; providing telecommunications connections to a global computer network for telecom hoteling; telecommunications gateway services; telecommunications routing and junction services; providing co-location services for voice, video and data communications applications on internal, extranet and global computer network servers, for others; leasing telecommunications equipment, components, systems and supplies; consulting services in the field of telecommunications
41 Educational services, namely, providing training in the use of software in the field of data security
42 Software as a service (SaaS) services featuring software in the field of data security for secure network access, data and software security, encryption, and content compliance and governance; providing temporary use of an online non-downloadable software application featuring enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies; providing temporary use of online non-downloadable software for use in document, data and information security, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; software as a service (SaaS) services, namely, hosting software for use in document, data and information security, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; leasing and rental of computing capacity, namely, computer software, computer hardware and computer networking equipment; evaluation of computer systems, namely, analysis of internal computer systems, extranet computer systems and global computer network systems, for others; implementing computer software for others; designing, developing and monitoring computer networks and computer systems for others; implementing computer network and computer system software for others; computer and network monitoring services, namely, performance reporting, load balancing, and computer network security services; managed services, namely, hosting the digital content and web sites of others on a global computer network; providing non-downloadable software for accessing and using a cloud computing network; software as a service (SaaS), namely, providing hosted software applications for others for use in information technology (IT) systems and information security management; application service provider (ASP) services, namely, hosting computer software applications of others; consulting services in the field of software as a service (SaaS); infrastructure as a service (IaaS), namely, providing remotely accessible server computing; providing a virtual computing environment accessible via the internet and other computer networks; providing virtual computer systems and virtual computer environments via cloud computing; leasing of computer servers; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and internet services; remote administration and management of in-house and hosted datacenter devices, databases and software applications for others; computer co-location services, namely, providing facilities for the location of computer servers with the equipment of others; providing secure, environmentally-controlled, facilities and technical monitoring for the computer servers and telecommunication and network equipment of others; computer disaster planning and recovery; design of premises-based, cloud-based and hybrid unified communications systems; providing temporary use of online non-downloadable computer software for compliance management and risk analysis in the fields of computer and network security; providing temporary use of online non-downloadable network security software; providing temporary use of online non-downloadable identity verification software; providing temporary use of non-downloadable network auditing software in the fields of secure communications and data networks; computer consultation and providing information in the field of internet and network security and secure transmission of data and information; electronic storage and archiving of data for others; storage of computer and telecommunications equipment for others; providing remote cloud-based server storage to others; data center services, namely, centralized storage of electronic data for others; technical consulting services in the field of electronic storage and archiving of data for others; infrastructure as a service (IaaS), namely, providing remotely accessible storage capacity; storage services for archiving of electronic data; monitoring of computers, websites, computer networks and communications network systems for security purposes; computer networks and communications network security services in the nature of intrusion protection, security threat analysis, managed security services, vulnerability management and assessment, threat analysis, incident response and forensics and penetration testing; providing user authentication services for security purposes to others in the field of voice and data communication services via computer network; computer security services in the nature of the issuance and management of digital certificates and other security credentials for others; identity as a service (IdaaS), namely, providing cloud-based computer network identification verification, authentication and management services for security purposes; computer security services, namely, secure hosted electronic storage of passwords, digital credentials and electronic identity information relating to persons, accounts and devices for security purposes; providing temporary use of online, non-downloadable software for fraud prevention and access authorization for verifying a user's true identity, both on-line and on-site, in the fields of controlling access to information, medical records, computer systems, websites, online services, e-commerce and financial transactions; consulting services in the field of computer security and communications network security; hosting a website featuring information in the fields of internet, network, computer and data security, as well as online fraud and identity theft protection; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer services, namely, providing search engines for obtaining data and information on a global computer network; computer services, namely, hosting a website featuring a media aggregator and search engine for internet content; providing a search engine for information, via a website; provision of internet search engines; hosting a website featuring on-line non-downloadable software that enables users to scan websites and identify malicious code injections, providing an assessment of the type and risk level of malware attacks and/or theft of credentials or other data; hosting a website featuring on-line non-downloadable software that enables users to obtain malware injection attack visibility by taking a screenshot of a malware-injected web page, enhancing attack detection accuracy and assisting in forensic investigations; providing temporary use of non-downloadable electronic fraud, identity theft and cyberattack protection and monitoring software; software as a service (SaaS) services featuring software for reporting, policy analytics and data visualization relating to domain-based message authentication, reporting and conference and compliance with applicable standards for same; providing temporary use of non-downloadable electronic fraud and identity theft protection software; providing temporary use of online non-downloadable secure software for providing safe browsing to users in e-commerce transactions, online financial transactions and online communications; electronic information security consulting, namely, penetration testing, review of software application code, and security analysis of software applications; electronic monitoring of computer networks for cyber attack incidents and providing information regarding such incidents; online fraud protection services, namely, namely electronic monitoring of personally identifying information and electronic transaction activity to detect fraud and identity theft via the internet; computer security services for protecting data and information from unauthorized access, in the nature of electronic monitoring of credit reports, Internet traffic and public records to facilitate the prevention of identity theft and fraud; electronic fraud protection services, namely, design and implementation of software and technology solutions for the purpose of electronic brand monitoring, to protect against counterfeiting, tampering, and diversion; electronic identification services, namely, providing user authentication services using technology for e-commerce transactions, online financial transactions, and online communications; electronic fraud and identity theft protection services identification services, namely, providing authentication services to users in e-commerce transactions, online financial transactions and online communications; providing on-line non-downloadable software for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection and policy and decisioning software systems; software as a service (SaaS) services, namely, hosting software for use by others for use for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decisioning software systems; providing temporary use of online non-downloadable computer software for data analytics, comprehensive data processing, visual analytics, machine learning and document production for use in digital investigations, e-discovery, intelligence mining and corporate communication compliance; consulting services in connection with enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen

Markenhistorie

Datum Belegnummer Bereich Eintrag
25. Juli 2023 2023/30 Gaz CA Ablehnung
04. August 2022 2022/32 Gaz JP RAW: Rule 18ter(2)(ii) GP following a provisional refusal
04. April 2022 2022/25 Gaz US RAW: Partial Ceasing Effect
01. März 2022 2022/11 Gaz US Korrektur
23. Dezember 2021 2021/52 Gaz JP Ablehnung
13. Oktober 2021 2021/41 Gaz GB Ablehnung
22. September 2021 2021/38 Gaz CO Ablehnung
30. Juni 2021 2021/26 Gaz EM Ablehnung
27. März 2020 2021/4 Gaz US Eintragung

ID: 141574768