REDBORDER
Mark Identification

REDBORDER

Serial Number

97782163

Filing Date

Feb 6, 2023

Trademark by

ENEO TECNOLOGIA S.L.

Classification Information

(Based on 44(d) Priority Application) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software(Based on 44(e)) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software

Electrical and Scientific Apparatus

(Based on 44(d) Priority Application) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks(Based on 44(e)) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks

Computer and Scientific