undefined
EUTM file information

018893856

SECHER


June 26, 2023

Trademark Summary

The trademark application SECHER was filed by Secher Security ApS, a corporation established under the laws of the Kingdom of Denmark (the "Applicant"). The application was published for oppositions on August 9, 2023, and it was registered by office on November 16, 2023 without any oppositions.

The application was filed in Danish (English was selected as the second language).

Change of name and professional address of the trademark registration was recorded on February 7, 2024. Change of name and professional address of the trademark registration was recorded on May 29, 2024.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer hardware and software
    2. Secure Access Service Edge (SASE) hardware and software
    3. SASE hardware and software for network security features with Wide Area Networking (WAN) capabilities
    4. Computer hardware for WANs
    5. WAN [wide area network] operating software routers, routing switches, remote access point management devices, exit control devices, Multiplexers and WAN [wide area network] operating software routers, routing switches, remote access point management devices
    6. Edge computing and storage devices
    7. Computer security software, Data security software and cyber security software, Application software for computer, data and cybersecurity
    8. Software and applications for computer, data and cybersecurity risk monitoring, assessment and mitigation
    9. Software and applications for monitoring, detecting, analysing, tracking, treating and preventing computer, data and cybersecurity threats and vulnerabilities
    10. Software and applications for scanning for data and cybersecurity threats and vulnerabilities
    11. Data processing programs and Application software For compliance monitoring and data breach monitoring
    12. Systems for monitoring computer, data, cyber and internet security systems.
  • The mark was filed in class 38 with following description of goods:
    1. Telecommunication services
    2. Telecommunications services, namely, providing internet access via wireless networks
    3. Internet service provider [ISP] services
    4. Wireless Internet access services
    5. Providing internet access via wireless networks
    6. Services relating to the Internet, namely Providing wireless multiple user access to the Internet
    7. Provision of internet and intranet wireless connectivity
    8. Providing access to a virtual network of wireless local area network access points
    9. Transmission of information Via virtual networks, Transmission of information via telecommunications networks
    10. Wireless networking services, namely Provision of access to a virtual wireless telecommunications network to enable location-based and context-aware services.
  • The mark was filed in class 42 with following description of goods:
    1. Provision of security services for computer networks, using routers, routing switches, remote access point controllers, access control devices, multiplexers and network devices provided as a service Provision of security services for computer networks, using SASE hardware and software for network security functions with Wide Area Networking (WAN) capabilities
    2. Leasing and hiring of computer hardware and/or computer software
    3. Software as a service [SaaS]
    4. Platform as a service [PaaS]
    5. Software as a Service and Platform as a Service with software for computer, data, and cybersecurity, including software for computer, data, and cybersecurity risk monitoring, assessment, and mitigation, software for monitoring, detection, analysis, tracking, handling, and prevention of computer, data, and cybersecurity threats and vulnerabilities, software for scanning for data and cybersecurity threats and vulnerabilities, and software for compliance monitoring and monitoring of data leakage
    6. Services and Consultation Relating to the following sectors: Computer security, Data security and cybersecurity
    7. Services and Consultation Relating to the following sectors: internet security
    8. IT consulting services and IT security services, Relating to the following sectors: Prevention of data leakage, hacking and unauthorised access to networks
    9. Studies, Relating to the following sectors: Data security, cybersecurity, Computer security, and internet security
    10. IT security, protection and restoration
    11. Analysis of data, computer and cyber security threats for data protection purposes
    12. Computer system monitoring services, Relating to the following sectors: Computer security, Data security services and Cyber security
    13. Provision of computer, data and cyber risk management programmes
    14. Computer security services for protection against unauthorized network access and hacking
    15. Maintenance of software for computer, data and cyber security and for prevention of computer risks and data leakage.