undefined
EUTM file information

018673174

SOPHOS CYBERSECURITY DELIVERED


March 15, 2022

Trademark Summary

The trademark application SOPHOS CYBERSECURITY DELIVERED was filed by Sophos Limited, a corporation established under the laws of the United Kingdom of Great Britain and Northern Ireland (the "Applicant"). The application was published for oppositions on July 31, 2022, and it was registered by office on November 7, 2022 without any oppositions.

The application was filed in English (Italian was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer hardware
    2. Wireless access points
    3. Computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
    4. Computer software, computer programs, and downloadable mobile applications for enforcing data policies
    5. Computer anti-virus software
    6. Computer anti-malware software
    7. Computer anti-spam software
    8. Computer anti-adware software
    9. Computer anti-spyware software
    10. Computer software for encryption
    11. Downloadable computer data-security programs
    12. Computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints
    13. Computer compliance software
    14. Computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking
    15. Network monitoring hardware and software
    16. Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data
    17. Downloadable computer software for IT infrastructure and cybersecurity automation
    18. Downloadable electronic publications and data in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices
    19. Mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases
    20. Parts, fittings and accessories for all of the aforesaid goods.
  • The mark was filed in class 16 with following description of goods:
    1. Paper and cardboard
    2. Printed matter
    3. Stationery
    4. Office requisites (except furniture)
    5. Instructional and teaching material (except apparatus)
    6. Plastic materials for packaging
    7. Parts, fittings and accessories for all of the aforesaid goods.
  • The mark was filed in class 21 with following description of goods:
    1. Containers
    2. Drinking vessels and containers
    3. Water bottles
    4. Lunch boxes
    5. Food storage containers
    6. Parts, fittings and accessories for all of the aforesaid goods.
  • The mark was filed in class 25 with following description of goods:
    1. Clothing
    2. Footwear
    3. Headgear
    4. Parts, fittings and accessories for all of the aforesaid goods.
  • The mark was filed in class 28 with following description of goods:
    1. Toys
    2. Games and playthings
    3. Gymnastic and sporting articles
    4. Surfboards
    5. Skateboards
    6. Flying discs
    7. Parts, fittings and accessories for all of the aforesaid goods.
  • The mark was filed in class 35 with following description of goods:
    1. Business intelligence services
    2. Business data analysis services
    3. Business research and advisory services
    4. Business advisory services in connection with IT security
    5. Administration of a program for enabling participants to receive expedited services in the field of data security, computer security, and network security
    6. Business administration services
    7. Customer service management for others
    8. Promoting the use of the security assurance best practices of others in the field of cloud computing
    9. Retail services connected with the sale of software and hardware
    10. Retail services connected with the sale of computer hardware and computer software via a distributorship
    11. Database management
    12. Wholesale services connected with the sale of computer hardware and computer software via a distributorship
    13. Information, consultancy and advisory services relating to the aforesaid.
  • The mark was filed in class 37 with following description of goods:
    1. Installation, maintenance and repair of computer hardware
    2. Troubleshooting in the nature of the repair of computer hardware
    3. Information, consultancy and advisory services relating to the aforesaid.
  • The mark was filed in class 38 with following description of goods:
    1. Telecommunication access services
    2. Telecommunications services
    3. Providing virtual private network (VPN) services
    4. Private and secure electronic communications over a private or public computer network
    5. Secure telecommunication services
    6. Providing access to computer networks over telecommunications networks
    7. Providing access between computers and computer networks over telecommunications networks
    8. Providing access between computer networks and servers over telecommunications networks
    9. Providing access between computers and servers over telecommunications networks
    10. Communications by computer terminals
    11. Transmission of messages and images by computers
    12. Electronic transmission of data over telecommunications networks
    13. Information, consultancy and advisory services relating to the aforesaid.
  • The mark was filed in class 41 with following description of goods:
    1. Education
    2. Providing of training
    3. Educational services
    4. Conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith
    5. Information, consultancy and advisory services relating to the aforesaid.
  • The mark was filed in class 42 with following description of goods:
    1. Software authoring
    2. Computer services for the protection of software
    3. Data security services
    4. Computer software technical support services
    5. Troubleshooting of computer software problems
    6. Technical advice related to computer and network security
    7. Installation, maintenance and repair of computer software
    8. Computer security consultancy
    9. Computer consulting services
    10. Computer software, hardware, firmware, network, and computer security consulting services
    11. Providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
    12. Providing on-line, non-downloadable software for enforcing data policies
    13. Providing on-line, non-downloadable software for encryption
    14. Providing on-line, non-downloadable computer compliance software
    15. Providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking
    16. Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
    17. Platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
    18. Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices
    19. Computer development services
    20. Computer programming services
    21. Computer virus protection services
    22. Computer security services by way of notification of unauthorized electronic messages and related computer attacks
    23. Computer security services
    24. Computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
    25. Providing information on data security, and computer security
    26. Technical advice related to computer and computer network security
    27. Monitoring of computer systems for security purposes
    28. Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation
    29. Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation
    30. Technology consulting services in the field of cloud computing
    31. Technology consulting services in the field of cybersecurity
    32. Technology consulting services in the field of IT infrastructure and cybersecurity automation
    33. Providing a website in connection with information in the field of security
    34. Providing a website used to place on-line commercial orders in the field of computer hardware and computer software
    35. Tracking, monitoring, and reporting for purposes of protecting against data theft, identity theft and fraud
    36. Anti-spamming services to assist in the prevention of unsolicited commercial communications
    37. Information, consultancy and advisory services relating to the aforesaid.
  • The mark was filed in class 45 with following description of goods:
    1. Providing online legal information in the field of privacy and data security
    2. Consultancy in the field of data theft and identity theft
    3. Identity verification services
    4. Identity validation services
    5. Identity theft detection and protection services
    6. Fraud protection services
    7. Providing authentication of personal identification information [identification verification services]
    8. Consultation in the field of data theft and identity theft
    9. Monitoring reports concerning larger scale consumer data security breaches for fraud protection purposes
    10. Monitoring personal financial account activities for atypical activities for fraud protection services
    11. Information, consultancy and advisory services relating to all of the aforesaid.