Trademark Alertz ®
Search
Trademark
Owner
Trademark: SOPHOS CLOUD OPTIX 2202084
Word
SOPHOS CLOUD OPTIX
ID
2202084
Trademark Type
Word
Status
Protected: Registered/protected
Application Date
29 March 2021
Registration Date
29 March 2021
Renewal Date
29 March 2031
Owner(s)
Sophos Limited
Service
Davies Collison Cave Pty Ltd
Goods and Services:
Class 42
:
Outsource service providers in the field of information technology
;
technical advice relating to operation of computers
;
technical support services
;
24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts
;
remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems
;
troubleshooting of computer software problems
;
monitoring technological functions of computer network systems
;
computer programming services for the protection of software
;
data security services
;
computer software technical support services
;
installation, maintenance and repair of computer software
;
computer security consultancy
;
computer software consulting services
;
computer technology consulting services
;
computer security consultancy services
;
consultancy in the design and development of computer hardware
;
computer software, hardware, firmware, network, and computer security consulting services
;
providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
;
providing on-line, non-downloadable software for enforcing data policies
;
providing on-line, non-downloadable software for encryption
;
providing on-line, non-downloadable computer compliance software
;
providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking
;
software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
;
software as a service (SAAS) services featuring software for securing users, and security policies
;
software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow
;
software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks
;
software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks
;
software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks
;
software as a service (SAAS) services featuring software for network asset inventory management
;
software as a service (SAAS) services featuring software for conducting security and compliance assessments
;
software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users
;
software as a service (SAAS) services featuring software for computer network and computer system security
;
platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
;
cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
;
computer development services
;
computer programming services
;
computer virus protection services
;
computer security services by way of notification of unauthorized electronic messages and related computer attacks
;
computer security services
;
computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
;
providing information on data security, and computer security
;
troubleshooting of computer software problems
;
technical advice related to computer and computer network security
;
monitoring of computer systems for security purposes
;
24/7 monitoring of servers and web and database applications and notification of related events and alerts
;
remote and on-site services for monitoring, administration and management of public and private cloud computing and application computing systems
;
computer security consultancy
;
providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices
;
providing on-line, non-downloadable software for enforcing data policies
;
providing on-line, non-downloadable computer compliance software
;
providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking
;
software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices
;
software as a service (SAAS) services featuring software for securing users, and security policies
;
software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, and traffic flow
;
software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, and computer systems
;
software as a service (SAAS) services featuring software for automated monitoring of users, security policies, and computer systems
;
software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, and computer systems
;
software as a service (SAAS) services featuring software for asset inventory management
;
software as a service (SAAS) services featuring software for conducting security and compliance assessments
;
software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users
;
computer virus protection services
;
computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources based on assigned credentials
;
providing information on data security and computer security
;
monitoring of computer systems for security purposes.