ALLURITY
Mark Identification

ALLURITY

Serial Number

79358996

Filing Date

Nov 10, 2022

Trademark by

ALLURITY BIDCO AB

Classification Information

downloadable utility, security and cryptography software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; downloadable software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts for network and device security; downloadable software development tools; downloadable security software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; network access server hardware; downloadable mobile applications for the management of information; downloadable internet access software; downloadable computer software for the management of information; downloadable computer software for biometric systems for the identification and authentication of persons

Electrical and Scientific Apparatus

updating of computer software relating to computer security and prevention of computer risks; software development, programming and implementation; software design and development; rental of internet security programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of security services for computer networks, computer access and computerised transactions, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of computer security risk management programs, namely, programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of information technology, namely, providing information in the field of computer software design and development and cybersecurity; IT security, protection and restoration, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of computer software design; programming of internet security programs; monitoring of computer systems for security purposes, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; maintenance of computer software relating to computer security and prevention of computer risks; IT consultancy, advisory and information services relating to cyber security; internet security consultancy; digital asset management, namely, electronic data storage; electronic monitoring of personally identifying information to detect identity theft via the internet; development of software for secure network operations; design and development of virtual private network (VPN) operating software; development of computer hardware and software; design and development of internet security programs; design and development of electronic data security systems; data security consultancy services; IT security consultancy services for analysing information systems; consultancy in the field of security software; consultancy in the field of data security; consultancy and information services relating to information technology architecture and infrastructure; consultancy in the field of computer data security; consultancy and information services relating to computer system integration; computer security threat analysis for protecting data; computer security services in the nature of administering digital certificates; computer programming services for electronic data security; computer software and information technology in the nature of IT security consultancy services; authentication services for computer security, namely, consultancy and software management in relation to identity security and identity and access management,; advisory services relating to computer based information systems, namely, IT security consultancy

Computer and Scientific

consultancy in the field of data theft and identity theft, namely, verification of personal identity as part of personal background investigations; identity validation services, namely, verification of personal identity as part of personal background investigations

Personal