EUTM file information

018653267

XALO


February 10, 2022

Trademark Summary

The trademark application XALO was filed by Malwarebytes Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on April 3, 2022, and it was registered by office on July 11, 2022 without any oppositions.

The application was filed in English (Italian was selected as the second language).

Appointment and Replacement of representative of the trademark registration was recorded on September 21, 2023. Creation of rights in rem of the trademark registration was recorded on November 19, 2023. Change of name and professional address of the trademark registration was recorded on March 12, 2024.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable anti-malware software
    2. Downloadable anti-spyware software
    3. Downloadable software for use in the safeguarding of digital files
    4. Downloadable software for preventing, identifying, and removing malware
    5. Downloadable software for ensuring the security of computer systems
    6. Downloadable computer anti-virus software
    7. Downloadable software that enhances computer processing power
    8. Downloadable software for providing online identity protection
    9. Downloadable computer software for providing cryptographic network security and data security functions
    10. Downloadable software for researching suspicious applications
    11. Downloadable software for detecting and removing security threats, viruses, malware, ransomware, and potentially unwanted programs
    12. Downloadable software for measuring and evaluating digital assets and risk exposure on computers, electronic devices, and smart phones
    13. Downloadable software for vulnerability assessment services
    14. Downloadable software for protecting and securing the integrity of data, applications, computer networks, computers, electronic devices, and smartphones
    15. Downloadable software for intrusion prevention services
    16. Downloadable software for automatic updating of computer software
    17. Downloadable software for data encryption and creating virtual private networks.
  • The mark was filed in class 42 with following description of goods:
    1. Computer consultation
    2. Computer services, namely, detection of computer viruses and computer security threats
    3. Consulting in the field of information technology
    4. Computer consultation in the field of computer system security
    5. Maintenance and updating of computer software relating to ensuring the security of computer systems
    6. Computer security consultancy services
    7. Cloud computing services, namely, providing temporary use of online non-downloadable software for providing computer system security
    8. Computer virus protection services
    9. Providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks
    10. Software as a service (SaaS) services featuring anti-malware software
    11. Software as a service (SaaS) services featuring anti-spyware software
    12. Software as a service (SaaS) services featuring software for use in the safeguarding of digital files
    13. Software as a service (SaaS) services featuring software for preventing, identifying, and removing malware
    14. Software as a service (SaaS) services featuring software for ensuring the security of computer systems
    15. Software as a service (SaaS) services featuring computer anti-virus software
    16. Software as a service (SaaS) services featuring software that enhances computer processing power
    17. Software as a service (SaaS) services featuring software for providing online identity protection
    18. Software as a service (SaaS) services featuring software for providing cryptographic network security and data security functions
    19. Software as a service (SaaS) services featuring software for researching suspicious applications
    20. Software as a service (SaaS) services featuring software for detecting and removing security threats, viruses, malware, ransomware, and potentially unwanted programs
    21. Software as a service (SaaS) services featuring software for measuring and evaluating digital assets and risk exposure on computers, electronic devices, and smart phones
    22. Software as a service (SaaS) services featuring software for vulnerability assessment services
    23. Software as a service (SaaS) services featuring software for protecting and securing the integrity of data, applications, computer networks, computers, electronic devices, and smartphones
    24. Software as a service (SaaS) services featuring software for intrusion prevention services
    25. Software as a service (SaaS) services featuring software for automatic updating of computer software
    26. Software as a service (SaaS) services featuring software for data encryption and creating virtual private networks
    27. Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices.