undefined
EUTM file information

018888629

DATAHAWK


June 14, 2023

Trademark Summary

The trademark application DATAHAWK was filed by Cohesity, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on July 12, 2023, and it was registered by office on October 19, 2023 without any oppositions.

The application was filed in English (German was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable computer software for computer security, data protection and data security
    2. Downloadable computer software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    3. Downloadable computer software for recovery of lost, deleted or compromised data
    4. Downloadable computer software for disaster recovery
    5. Downloadable computer software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    6. Downloadable computer software featuring customizable computer security software for others in the field of cybersecurity
    7. Downloadable computer software for backup and recovery of digital and electronic data
    8. Downloadable computer software featuring AI/ML-based software for data classification and data forensics in the field of cybersecurity
    9. None of the aforementioned goods used in relation to advertising, marketing, promotion or ecommerce for others or for searchable computer database software or data centers.
  • The mark was filed in class 42 with following description of goods:
    1. Software as a service (SaaS) services featuring computer security, data protection and data security software
    2. Providing non-downloadable software for computer security, data protection and data security
    3. Software as a service (SaaS) services featuring software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    4. Providing non-downloadable software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    5. Software as a service (SaaS) services featuring software for recovery of lost, deleted or compromised data
    6. Providing non-downloadable software for recovery of lost, deleted or compromised data
    7. Software as a service (SaaS) services featuring software for disaster recovery
    8. Providing non-downloadable software for disaster recovery
    9. Software as a service (SaaS) services featuring software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    10. Providing non-downloadable software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    11. Computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    12. Software as a service (SaaS) services featuring customizable computer security software for others in the field of cybersecurity
    13. Providing non-downloadable software featuring customizable computer security software for others in the field of cybersecurity
    14. Backup services for computer hard drives, flash drives, and cloud-based storage for recovering and restoring computer data
    15. Software as a service (SaaS) services featuring software for backup and recovery of digital and electronic data
    16. Providing non-downloadable software for backup and recovery of digital and electronic data
    17. Computer security analysis services, namely, analysis of secondary copies of data for detecting malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    18. Storage services, namely, cloud-based electronic data storage
    19. Computer security monitoring services, namely, monitoring of computer systems for detecting malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
    20. Computer forensic services
    21. Providing non-downloadable cloud-based and on-premise AI/ML-based software for data classification and data forensics in the field of cybersecurity
    22. Managed cybersecurity services in the fields of intrusion detection, intrusion prevention, cybersecurity threat detection and prevention, namely, online scanning, detecting, and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise for cybersecurity purposes
    23. None of the aforementioned services used in relation to advertising, marketing, promotion or e-commerce services for others or for searchable computer database software or data center services.