Trademark: 2295576
Word
Device Descrption:
2 TRIANGLES,STACKED
ID
2295576
Trademark Type
Figurative
Status
Registered: Registered/protected
Application Date
24 August 2022
Registration Date
24 August 2022
Renewal Date
24 August 2032

Service
Catalyst Intellectual Property

Goods and Services:
Class 9:
Computer software for testing vulnerability in computers, computer systems and computer networks, identifying and assessing security risks; computer software for threat and risk-management assessments, analysis, and investigations; computer software for scanning and monitoring computer network connections for signs of unauthorized entry, intrusion detection and prevention and management; computer software for creating, monitoring and maintaining firewalls; computer software for monitoring and collecting computer system and computer network data; computer software for scanning computer operating systems, computer networks and computer data storage devices for computer viruses and other malware; computer software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; computer software for encryption and decryption; computer software for testing vulnerability in computers; computer software for creating, monitoring and maintaining firewalls; computer software for monitoring and collecting computer systems and network data; computer software for scanning computer operating systems, computer networks and computer data storage devices for computer viruses and other malware; computer software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; computer software for encryption and decryption; security software; cloud computing software; application software for cloud computing services; computer hardware; online electronic publications (downloadable); online electronic publications (downloadable) for education, training and tuition.
Class 42:
Research, development, design, implementation and testing services in the fields of computer, computer system and computer network security including software verification and validation testing; technical data analysis; testing, technological analysis and consulting services in the field of security, access, authorisation, and identification systems for users of computers, computer systems and computer networks; testing services for computer, data and cyber security; provision of computer security risk management and mitigation programs; provision of expert appraisals and professional consultancy relating to computer security; recovery of computer data; remote computer backup services; security services for computer networks, computer access and computerised transactions; providing non-downloadable software for testing vulnerability in computers, computer systems and computer networks, identifying and assessing security risks; computer software for threat and risk-management assessments, analysis, and investigations; computer software for scanning and monitoring computer network connections for signs of unauthorized entry, intrusion detection and prevention and management; providing non-downloadable software for creating, monitoring and maintaining firewalls; providing non-downloadable software for monitoring and collecting computer systems and network data; providing non-downloadable software for scanning computer operating systems, computer networks and computer data storage devices for computer viruses and other malware; providing non-downloadable software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; providing non-downloadable software for encryption and decryption; cloud computing services for developing and implementing computer networks and computer systems; cloud computing services for computer data, computer network and computer system security, cybersecurity, user testing and validation; software as; a service (SaaS) for developing and implementing computer networks and computer systems; software as a service (SaaS) for computer data, computer network and computer system security, cybersecurity, user testing and validation, cybersecurity, user testing and validation; services in providing technical advice, support and assistance in the field of computer security and cyber security; analysis relating to computer software, computer systems and networks; computer, computer system and computer network security protection services; computer consultancy relating to IT security; cybersecurity services including collecting, aggregating and technical analysis of cybersecurity threat data and information intelligence; cybersecurity services including generating and delivery of threat reports; services in monitoring and protecting computer networks, providing cyber security and information security diligence and solutions; computer security consultancy; computer software testing to identify security vulnerability; computer forensic services; computer security consulting services in the field of maintaining the security and integrity of databases; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis; computer and network incident response and forensics and penetration testing; computer disaster recovery planning; computer forensics; computer security services; computer security software development and maintenance; computer security system monitoring services; computer security threat analysis for protecting data; computer services, namely, providing technical information and design of databases for the security of data, monitoring the privacy and confidentiality of data on a website, and evaluating website security; technological consulting servic; es in the fields of computer security and cyber-security, computer and cyber-threat assessment and remediation; computer, data and cyber security consultation and quality accreditation services; computer, data and cyber security services; software development and maintenance; design and development of security software for cloud computing networks; design, development, implementation, testing, analysis and consultancy relating to IT security solutions; internet security consultancy; information technology security services including testing to assess security controls, protection and recovery of computer data; maintenance and updating of computer software relating to computer, data and cyber security and prevention of risks; advisory, consultancy and information services in relation to all the aforesaid; all the aforesaid services also provided online, via the Internet, via a website, or via a communications network.