The trademark application ecce Powered by RHEA Group Cybersecurity Services was filed by RHEA Group Cyber Security Services, SA, a corporation established under the laws of the Kingdom of Belgium (the "Applicant"). The application was published for oppositions on September 19, 2023, and it was registered by office on December 27, 2023 without any oppositions.
The application was filed in English (French was selected as the second language).
Change of name and address of the trademark registration was recorded on September 27, 2023.
Goods And Services
The mark was filed in class 9 with following description of goods:
Computer security software
Computer software for testing vulnerability in computers and computer networks
Software for detecting, blocking, and facilitating the elimination and remediation of cyberattacks
Software platform to identify problems and improve infrastructure security in real-world scenarios, then develop and test incident response plans
Computer software platform for infrastructure and network emulation.
The mark was filed in class 41 with Training in the field of IT security and cyber security.
The mark was filed in class 42 with following description of goods:
Computer programming services for electronic data security
Computer security consultancy
Computer security services for protection against illegal network access
Consultancy in the field of security software
Updating and maintenance of computer software relating to computer security and prevention of computer risks
Provision of computer security risk management programs
Provision of security services for computer networks and computer access
Rental of internet security programs
Monitoring of computer systems for detecting unauthorized access or data breach
Testing of computer programs, of computing equipment, of computers and of electronic data processing systems
Computer security threat analysis for protecting data
Software as a service (SaaS) featuring a software platform to learn how to identify problems and improve infrastructure security in real-world scenarios, then develop and test incident response plans
Provision of information in the field of IT security and cyber threats.