CORPSUITE
Mark Identification

CORPSUITE

Serial Number

99707969

Filing Date

Mar 17, 2026

Trademark by

LEMON INC.

Classification Information

Software; mobile application software; downloadable computer software applications; computer software platforms; downloadable and recorded content; interactive software; recorded media; downloadable cloud based software; IT management and office security software; IT management and office security software platform software; computer software platforms for IT management and administration; computer software for identity and access management, authentication, authorisation, single sign on, multi factor authentication, and permissions management; computer software for user, device, and endpoint management; computer software for endpoint security, endpoint detection and response, threat detection, malware protection, and vulnerability management; computer software for network security, network access control, and secure network connectivity; computer software for secure remote access to computer systems and networks; computer software for cybersecurity monitoring, security analytics, and security event logging; computer software for policy based security management, automated security controls, and compliance monitoring; computer software for data protection, encryption, and secure communications; computer software for monitoring, controlling, and managing access to computer systems, networks, applications and data; computer software for integration, orchestration, and automation of IT management and security systems; computer software for reporting, auditing, and analysis relating to IT operations and security; computer software for cloud computing, virtualised computing environments, and distributed computing systems.

Electrical and Scientific Apparatus

Computer programming; Computer software design; Design and development of computer software; design and development of IT management and office security software; design and development of computer software platforms for IT management and administration; design and development of computer software for identity and access management, authentication, authorisation, single sign on, multi factor authentication, and permissions management; computer software for user, device, and endpoint management; design and development of computer software for endpoint security, endpoint detection and response, threat detection, malware protection, and vulnerability management; design and development of computer software for network security, network access control, and secure network connectivity; design and development of computer software for secure remote access to computer systems and networks; design and development of computer software for cybersecurity monitoring, security analytics, and security event logging; design and development of computer software for policy based security management, automated security controls, and compliance monitoring; design and development of computer software for data protection, encryption, and secure communications; design and development of computer software for monitoring, controlling, and managing access to computer systems, networks, applications and data; design and development of computer software for integration, orchestration, and automation of IT management and security systems; design and development of computer software for reporting, auditing, and analysis relating to IT operations and security; design and development of computer software for cloud computing, virtualised computing environments, and distributed computing systems; software as a service (SaaS) services; software as a service (SaaS) services featuring IT management and office security software; software as a service (SaaS) services featuring IT management and office security software platform software; software as a service (SaaS) services featuring software platforms for IT management and administration; software as a service (SaaS) services featuring software for identity and access management, authentication, authorisation, single sign on, multi factor authentication, and permissions management; software as a service (SaaS) services featuring software for user, device, and endpoint management; software as a service (SaaS) services featuring software for endpoint security, endpoint detection and response, threat detection, malware protection, and vulnerability management; software as a service (SaaS) services featuring software for network security, network access control, and secure network connectivity; software as a service (SaaS) services featuring software for secure remote access to computer systems and networks; software as a service (SaaS) services featuring software for cybersecurity monitoring, security analytics, and security event logging; software as a service (SaaS) services featuring software for policy based security management, automated security controls, and compliance monitoring; software as a service (SaaS) services featuring software for data protection, encryption, and secure communications; software as a service (SaaS) services featuring software for monitoring, controlling, and managing access to computer systems, networks, applications and data; software as a service (SaaS) services featuring software for integration, orchestration, and automation of IT management and security systems; software as a service (SaaS) services featuring software for reporting, auditing, and analysis relating to IT operations and security; software as a service (SaaS) services featuring software for cloud computing, virtualised computing environments, and distributed computing systems; platform as a service (PaaS); provision of software applications through a website; providing temporary use of non downloadable software; providing temporary use of non-downloadable software for IT management and office security; providing temporary use of non-downloadable platform software for IT management and office security; providing temporary use of non-downloadable software platforms for IT management and administration; providing temporary use of non-downloadable software for identity and access management, authentication, authorisation, single sign on, multi factor authentication, and permissions management; providing temporary use of non-downloadable software for user, device, and endpoint management; providing temporary use of non-downloadable software for endpoint security, endpoint detection and response, threat detection, malware protection, and vulnerability management; providing temporary use of non-downloadable software for network security, network access control, and secure network connectivity; providing temporary use of non-downloadable software for secure remote access to computer systems and networks; providing temporary use of non-downloadable software for cybersecurity monitoring, security analytics, and security event logging; providing temporary use of non-downloadable software for policy based security management, automated security controls, and compliance monitoring; providing temporary use of non-downloadable software for data protection, encryption, and secure communications; providing temporary use of non-downloadable software for monitoring, controlling, and managing access to computer systems, networks, applications and data; providing temporary use of non-downloadable software for integration, orchestration, and automation of IT management and security systems; providing temporary use of non-downloadable software for reporting, auditing, and analysis relating to IT operations and security; providing temporary use of non-downloadable software for cloud computing, virtualised computing environments, and distributed computing systems; Updating and maintenance of computer software; cloud computing services; hosting platforms on the Internet; Electronic data storage; technical support services relating to computer software, IT systems and cloud based platforms; Artificial intelligence as a service [AIaaS]; information, advisory, and consultancy services relating to all of the aforesaid

Computer and Scientific