Trademark: 2031468
Word
Device Descrption:
DIAMOND & 2 TRIANGLES FORM PRISM
ID
2031468
Trademark Type
Figurative
Status
Registered: Registered/protected
Application Date
20 August 2019
Registration Date
20 August 2019
Renewal Date
20 August 2029

Service
PHILLIPS ORMONDE FITZPATRICK

Goods and Services:
Class 9:
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data; computer software, firmware and hardware for detecting suspicious behaviour; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for information technology and communications technology security purposes; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, computer software, firmware and hardware for use in defence, law enforcement, and business process optimisation; data processing apparatus and instruments; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data, of information, and of electronic communications; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware, hardware, sensors and apparatus for gathering intelligence and evidence; computer software, firmware, hardware; parts and fittings for computer firmware and computer hardware; mobile applications designed to deliver, assess or analyse security rating.
Class 42:
Information technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, the security of computer networks; installation, integration, implementation , configuration, servicing, maintenance, updating, upgrading , repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, including patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services relating to due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services relating to computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services relating to the matching, transforming, sampling, partitioning and analysis of data; analytical services relating to computers, computer software, computer networks and communications networks; artificial intelligence and neural network modelling; industrial analysis and research services; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; software as a service (SAAS) featuring software for use in providing threat prevention, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, and endpoints; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, and endpoints; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, and endpoints; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defence and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, and endpoints; providing online non-downloadable intrusion detection software; data security services namely the provision of computer firewalls; security risk assessment services relating to computer systems, social media, online and cyber activity electronic data storage; data storage namely computerised business information storage; Technical support services in the fields of computer, data, email, web and network security, namely, monitoring of network systems for technical and computer security purposes and troubleshooting in the nature of diagnosing computer hardware and software problems; information, advice and consultancy relating to all of the aforesaid services.