Trademark: SOPHOS CLOUD OPTIX 2202084
Word
SOPHOS CLOUD OPTIX
ID
2202084
Trademark Type
Word
Status
Protected: Registered/protected
Application Date
29 March 2021
Registration Date
29 March 2021
Renewal Date
29 March 2031

Owner(s)
Service
Davies Collison Cave Pty Ltd

Goods and Services:
Class 42:
Outsource service providers in the field of information technology; technical advice relating to operation of computers; technical support services; 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; troubleshooting of computer software problems; monitoring technological functions of computer network systems; computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer software consulting services; computer technology consulting services; computer security consultancy services; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for securing users, and security policies; software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; software as a service (SAAS) services featuring software for computer network and computer system security; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; 24/7 monitoring of servers and web and database applications and notification of related events and alerts; remote and on-site services for monitoring, administration and management of public and private cloud computing and application computing systems; computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for securing users, and security policies; software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, and traffic flow; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, and computer systems; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, and computer systems; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, and computer systems; software as a service (SAAS) services featuring software for asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; computer virus protection services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources based on assigned credentials; providing information on data security and computer security; monitoring of computer systems for security purposes.