SOPHOS CLOUD OPTIX

WIPO WIPO 2021

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The International trademark SOPHOS CLOUD OPTIX was filed as Word mark on 03/29/2021 at the World Intellectual Property Organization.

Trademark Details Last update: February 28, 2023

Trademark form Word mark
File reference 1607807
Countries Australia Brazil Canada Switzerland China India Japan Malaysia Philippines Singapore Turkey
Base trademark GB No. , August 29, 2024
Application date March 29, 2021
Expiration date March 29, 2031

Trademark owner

The Pentagon,
Abingdon Science Park,
GB

Trademark representatives

Meridian Court, Comberton Road, GB

goods and services

42 Outsource service providers in the field of information technology; technical advice relating to operation of computers; technical support services; 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; troubleshooting of computer software problems; monitoring technological functions of computer network systems; computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer software consulting services; computer technology consulting services; computer security consultancy services; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for securing users, and security policies; software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; software as a service (SAAS) services featuring software for computer network and computer system security; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; 24/7 monitoring of servers and web and database applications and notification of related events and alerts; remote and on-site services for monitoring, administration and management of public and private cloud computing and application computing systems; computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for securing users, and security policies; software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, and traffic flow; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, and computer systems; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, and computer systems; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, and computer systems; software as a service (SAAS) services featuring software for asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; computer virus protection services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources based on assigned credentials; providing information on data security and computer security; monitoring of computer systems for security purposes

Trademark history

Date Document number Area Entry
February 7, 2023 2023/6 Gaz MY Rejection
January 17, 2023 2023/8 Gaz SG RAW: Rule 18ter(2)(ii) GP following a provisional refusal
October 27, 2022 2022/43 Gaz CA Rejection
September 27, 2022 2022/46 Gaz RAW: Limitation
September 1, 2022 2022/36 Gaz JP RAW: Rule 18ter(2)(ii) GP following a provisional refusal
August 9, 2022 2022/34 Gaz BR Rejection
June 30, 2022 2022/26 Gaz CH Rejection
June 11, 2022 2022/30 Gaz PH RAW: Rule 18ter(2)(i) GP following a provisional refusal
May 26, 2022 2022/22 Gaz JP Rejection
February 28, 2022 2022/9 Gaz TR Rejection
February 1, 2022 2022/5 Gaz IN Rejection
December 20, 2021 2022/1 Gaz CN Rejection
November 26, 2021 2022/2 Gaz RAW: Limitation
November 9, 2021 2021/45 Gaz AU Rejection
October 9, 2021 2021/42 Gaz SG Rejection
August 27, 2021 2021/36 Gaz PH Rejection
March 29, 2021 2021/30 Gaz GB Registration

ID: 141607807