undefined
EUTM file information

018909632

Ecce Powered by RHEA Group Cybersecurity Services


August 2, 2023

Trademark Summary

The trademark application ecce Powered by RHEA Group Cybersecurity Services was filed by RHEA Group Cyber Security Services, SA, a corporation established under the laws of the Kingdom of Belgium (the "Applicant"). The application was published for oppositions on September 19, 2023, and it was registered by office on December 27, 2023 without any oppositions.

The application was filed in English (French was selected as the second language).

Change of name and address of the trademark registration was recorded on September 27, 2023.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer security software
    2. Computer software for testing vulnerability in computers and computer networks
    3. Software for detecting, blocking, and facilitating the elimination and remediation of cyberattacks
    4. Software platform to identify problems and improve infrastructure security in real-world scenarios, then develop and test incident response plans
    5. Computer software platform for infrastructure and network emulation.
  • The mark was filed in class 41 with Training in the field of IT security and cyber security.
  • The mark was filed in class 42 with following description of goods:
    1. Computer programming services for electronic data security
    2. Computer security consultancy
    3. Computer security services for protection against illegal network access
    4. Consultancy in the field of security software
    5. Updating and maintenance of computer software relating to computer security and prevention of computer risks
    6. Provision of computer security risk management programs
    7. Provision of security services for computer networks and computer access
    8. Rental of internet security programs
    9. Monitoring of computer systems for detecting unauthorized access or data breach
    10. Testing of computer programs, of computing equipment, of computers and of electronic data processing systems
    11. Computer security threat analysis for protecting data
    12. Software as a service (SaaS) featuring a software platform to learn how to identify problems and improve infrastructure security in real-world scenarios, then develop and test incident response plans
    13. Provision of information in the field of IT security and cyber threats.