Trademark: Cywaria 2191307
Word
Cywaria
ID
2191307
Trademark Type
Word
Status
Protected: Registered/protected
Application Date
18 January 2021
Registration Date
18 January 2021
Renewal Date
18 January 2031

Owner(s)
Service

Goods and Services:
Class 9:
Computer software for learning, training and practice in the fields of cyber security and cyber threats, simulation based cyber attack assessment, cyber security incident simulation exercises, disruptive cyber simulation, cyber attacks, virtual prevention testing, and breach and attack simulation; downloadable cyber security computer training software for protecting IT (Information Technology), OT (Operational Technology) and IoT (Internet of Things) systems and infrastructures; downloadable computer training software for simulating IT (Information Technology), OT (Operational Technology) and IoT (Internet of Things) systems, infrastructures and traffic and cyber-attacks; downloadable computer software for cyber security training and handling; computer software for behavioral analysis, machine learning algorithms and big-data analytics; computer software for managing cyber incident response, alert management, response management, cyber incident investigation, cyber incident workflow automation and cyber incident data collection and analysis; computer software for the purpose of cyber security training, network assessment, tool assessment, vulnerability assessment, and penetration testing; software for information asset, security, threat and vulnerability risk assessment, evaluation and management in the field of electronic information security; computer software used to develop information technology solutions for reducing information, asset, and security threats and information technology vulnerability risks for businesses; software for designing and developing information availability, integrity and security solutions; downloadable computer security software; computer software for controlling and managing access server applications.
Class 41:
Training in the fields of cyber security and cyber threats; training for personnel development; training in the use of computers; training in the field of communication technologies; training in the field of data processing; computer education training services; personal development training; vocational training; career and vocational training; computer based training; providing information relating to training; providing courses of instruction; providing on-line courses of instruction; know-how transfer [training]; production of instructional materials; providing of training and education; provision of training courses; conducting of training workshops; conducting of training seminars; conducting of training courses; business training; arranging and conducting of seminars and training workshops; arranging professional workshop and training courses; arranging and conducting of conferences, congresses, seminars and training workshops; basic and advanced training for human resources development; conducting of training courses in the field of technology and innovation; providing on-line information and news in the field of employment training; training and further training for personnel, team and organizational development; career counselling and coaching [training and education advice]; training in the use and operation of computers and data processors; organization and arranging of seminars, conferences, training courses and further training; providing of training; provision of training programs; vocational education and training services; training services in the field of computer software development; conducting of instructional, educational and training courses for young people and adults; vocational skills training.
Class 42:
Providing temporary use of non-downloadable cyber security computer training software for protecting IT (Information Technology), OT (Operational Technology) and IoT (Internet of Things) systems and infrastructures; providing temporary use of non-downloadable computer training software for simulating IT (Information Technology), OT (Operational Technology) and IoT (Internet of Things) systems, infrastructures and traffic and cyber-attacks; providing temporary use of non downloadable computer software for cyber security training and handling; development of information, asset and security risk reduction software tools for business use; design, development and project management of computer software and hardware used for information, asset and security risk solutions; providing temporary use of non-downloadable software used to assess, evaluate, manage and develop solutions to information, asset and security risks; computer security threat analysis for protecting data; computer security consultancy in the field of cyber security, namely, evaluation of intrusion detection and prevention risks and capabilities, including risks and capabilities in relation to software applications and firewalls, and configuration of intrusion detection and prevention computer systems; data security consultancy; information technology consulting services; Internet security consultancy; providing temporary use of non-downloadable computer programs for cyber surveillance, for identifying information systems' security vulnerability, for maintaining the security and integrity of computer networks and data storage facilities, for real-time analysis of security alerts, for defending against data breaches and privacy violations, for conducting network intrusion protection testing and for vulnerability management and assessment, risk management and assessment, data breach threat analysis and network threat analysis; maintenance of computer software; temporary electronic storage of information and data; providing on-line non-downloadable software for use in database management; testing, analysis and monitoring of navigation signals; testing, analysis and monitoring of telecommunication signals; testing of computer hardware and software; compilation of computer programs; information technology engineering; rental of Internet security programs; installation of software for computer systems; consultancy in the design and development of computer hardware; professional consultancy relating to computer security; writing of computer programs; writing of computer software; writing of data processing programs; technological research; product research; providing technical advice relating to computers; providing information in the field of computer software development; providing technical information about computers, computer software and computer networks; providing information about the design and development of computer software; monitoring of computer systems for detecting unauthorized access or data breach; computer system analysis; analysis of technical data; updating and maintenance of computer software; updating of computer software relating to computer security and prevention of computer risks; updating of computer software; updating of computer programs; design and development of computer systems; design and development of video game software; custom design of computer software; design of computer programs; development and testing of computer software; development and testing of computing methods, algorithms and software; development of computer platforms; development of computer game software; computer hardware and software testing services; computer-aided diagnostic testing services; information technology [IT] consultancy; computer and technology services for securing computer data; computer programming services for the protection of software; design and development of virtual reality software; design and development of Internet security programs.