Trademark: F F-SECURE 2350592
Word
F F-SECURE
Device Descrption:
QUADRANT IS PART OF LTR F
ID
2350592
Trademark Type
Figurative
Status
Protected: Registered/protected
Application Date
14 November 2022
Registration Date
14 November 2022
Renewal Date
14 November 2032

Service

Goods and Services:
Class 9:
Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; computer application software for mobile phones; cloud servers; cloud computing software; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); computer application software for use in implementing the Internet of Things (IoT); computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); embedded software; embedded software for use in implementing cyber security solutions for the Internet of Things (IoT).
Class 42:
Technological services; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; computer security services for protection against illegal network access; compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage; IT consultancy, advisory and information services; IT security services in the nature of protection and recovery of computer data; provision of cyber security services for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services in the field of data and applications; endpoint cyber security services; outsource service providers in the field of information technology; technical support services relating to computer software and applications; monitoring of network and computer systems; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; providing online, non-downloadable software; providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud computing services; administration of cloud servers, arranging of cloud computing services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services.