EUTM file information

018765451

SINGULARITY


September 21, 2022

Trademark Summary

The trademark SINGULARITY was filed by SentinelOne, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on December 7, 2022, and received undefined oppositions.

Opposition Proceedings

There are undefined Oppositions claimed against trademark.

The first opposition filed on March 7, 2023 by Singularity Education Group on (a) Identity of marks and Goods and Services, (b) Likelihood of confusion, (c) Unfair advantage and detriment to distinctiveness or repute. the opponent was represented by MITSCHERLICH, PATENT- UND RECHTSANWÄLTE, PARTMBB and its proceedings were handled in English The second opposition filed on February 19, 2023 by SINGULAR PEOPLE S.A. on Likelihood of confusion. the opponent was represented by IGLOBAX and its proceedings were handled in English The third opposition filed on January 30, 2023 by MULTIVERSE COMPUTING, S.L. on Likelihood of confusion. the opponent was represented by BALDER IP LAW, S.L. and its proceedings were handled in English

The application was filed in English, and English was also language of all opposition proceedings (German was selected as the second language).

Change of name and professional address of the trademark registration was recorded on June 18, 2023.

The Opposition with reference B 003189448 was refused according to Article 8(1)(b) EUTMR with decision issued on February 26, 2024 by the EUIPO.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable software featuring a suite of cybersecurity software and tools
    2. Downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
    3. Computer software feature for computer security incident tracking, sold as an integral component of downloadable software
    4. Downloadable software for Internet of Things (IOT) device and end point discovery and management
    5. Downloadable software for connected device discovery and management
    6. Downloadable software for computer network mapping
    7. Downloadable software for managing the cyber security of environments combining computing devices and related networks
    8. Downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks
    9. Downloadable software and applications for managing the cyber security of environments combining computing devices and related networks
    10. Downloadable software and applications for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks
    11. Computer software feature to search for and index electronic data relating to security incidents and threats, sold as an integral component of downloadable software for cybersecurity
    12. Computer software feature for ingesting, analyzing, and providing cybersecurity threat intelligence information, sold as an integral component of downloadable software for cybersecurity
    13. Downloadable computer software for accessing third-party computer software and associated data
    14. Downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data
    15. Downloadable cybersecurity software featuring technology for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources.
  • The mark was filed in class 42 with following description of goods:
    1. Platform as a Service (PaaS) services featuring a suite of cybersecurity software and tools
    2. Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
    3. Development and provision of a computer software feature for computer security incident tracking, sold as an integral component of online non-downloadable software
    4. Providing temporary use of on-line non-downloadable software for Internet of Things (IOT) device and end point discovery and management
    5. Providing temporary use of on-line non-downloadable software for connected device discovery and management
    6. Providing temporary use of on-line non-downloadable software for computer network mapping
    7. Providing a website featuring non-downloadable software for managing the cyber security of environments combining computing devices and related networks
    8. Providing a website featuring non-downloadable software for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks
    9. Providing temporary use of on-line non-downloadable software and applications for managing the cyber security of environments combining computing devices and related networks
    10. Providing temporary use of on-line non-downloadable software and applications for automated cyber threat protection, detection and remediation, and related data analytics and visualization capabilities in cyber environments combining computing devices and related networks
    11. Development and provision of a computer software feature to search for and index electronic data relating to security incidents and threats, sold as an integral component of online non-downloadable software for cybersecurity
    12. Development and provision of a computer software feature for ingesting, analyzing, and providing cybersecurity threat intelligence information, sold as an integral component of online non-downloadable software for cybersecurity
    13. Platform as a service (PAAS) services featuring computer software for accessing third-party computer software and associated data
    14. Providing temporary use of on-line non-downloadable software for creating and applying automated cybersecurity threat hunting rules, triggering automated alerts and responses, and automating application of new rules against existing data
    15. Providing non-downloadable cybersecurity software featuring technology for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources.