The trademark application AUXO was filed by ON2IT B.V., a corporation established under the laws of the Kingdom of the Netherlands (the "Applicant"). The application was published for oppositions on March 16, 2022, and it was registered by office on June 23, 2022 without any oppositions.
The application was filed in Dutch (English was selected as the second language).
Goods And Services
The mark was filed in class 9 with following description of goods:
Data processing equipment and computer software for the purpose of cyber security
Computer virus scanning and blocking software
Security log file analysing software
Computer software platforms for cyber security and information technology security
Computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification
Computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches and advances persistent threat attacks
Downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks.
The mark was filed in class 42 with following description of goods:
Development and design of computer software in the field of cyber security and secure network operations
Computer security services, namely enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
Maintenance and updating of computer software in the field of cyber and computer security
Maintenance and updating of computer software for preventing risks in online environments and computer networks
Data and internet and computer security consultancy services
Data and internet and computer security services, namely restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates
Computer security threat analysis for protecting data
Information technology security support services, namely keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data
Computer security services, namely analyzing services of data traffic in computer networks
Information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security
Data security services
Computer security system monitoring services
Computer security services, namely analysis of computers and networks to assess information security vulnerability and cyber threats
Computer security services, namely development of customized plans for improving computer security and preventing wrongful or risky activity
Research in the field of cyber intelligence technology and cyber security technology
Software-as-service (SaaS) or application service provider services (ASP), namely hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats.