The trademark application DATAHAWK was filed by Cohesity, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on July 12, 2023, and it was registered by office on October 19, 2023 without any oppositions.
The application was filed in English (German was selected as the second language).
Goods And Services
The mark was filed in class 9 with following description of goods:
Downloadable computer software for computer security, data protection and data security
Downloadable computer software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Downloadable computer software for recovery of lost, deleted or compromised data
Downloadable computer software for disaster recovery
Downloadable computer software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Downloadable computer software featuring customizable computer security software for others in the field of cybersecurity
Downloadable computer software for backup and recovery of digital and electronic data
Downloadable computer software featuring AI/ML-based software for data classification and data forensics in the field of cybersecurity
None of the aforementioned goods used in relation to advertising, marketing, promotion or ecommerce for others or for searchable computer database software or data centers.
The mark was filed in class 42 with following description of goods:
Software as a service (SaaS) services featuring computer security, data protection and data security software
Providing non-downloadable software for computer security, data protection and data security
Software as a service (SaaS) services featuring software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Providing non-downloadable software for detecting, preventing and managing malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Software as a service (SaaS) services featuring software for recovery of lost, deleted or compromised data
Providing non-downloadable software for recovery of lost, deleted or compromised data
Software as a service (SaaS) services featuring software for disaster recovery
Providing non-downloadable software for disaster recovery
Software as a service (SaaS) services featuring software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Providing non-downloadable software for computer security threat detection, analysis, prevention, integration of threat data, and investigation and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Software as a service (SaaS) services featuring customizable computer security software for others in the field of cybersecurity
Providing non-downloadable software featuring customizable computer security software for others in the field of cybersecurity
Backup services for computer hard drives, flash drives, and cloud-based storage for recovering and restoring computer data
Software as a service (SaaS) services featuring software for backup and recovery of digital and electronic data
Providing non-downloadable software for backup and recovery of digital and electronic data
Computer security analysis services, namely, analysis of secondary copies of data for detecting malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Storage services, namely, cloud-based electronic data storage
Computer security monitoring services, namely, monitoring of computer systems for detecting malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise
Computer forensic services
Providing non-downloadable cloud-based and on-premise AI/ML-based software for data classification and data forensics in the field of cybersecurity
Managed cybersecurity services in the fields of intrusion detection, intrusion prevention, cybersecurity threat detection and prevention, namely, online scanning, detecting, and management of malware, ransomware, and other cyberattacks, data breaches, data exfiltration, unauthorized access, unauthorized data movement and other indicators of compromise for cybersecurity purposes
None of the aforementioned services used in relation to advertising, marketing, promotion or e-commerce services for others or for searchable computer database software or data center services.