SAPORO ORDER IN CHAOS
Mark Identification

SAPORO ORDER IN CHAOS

Serial Number

79359622

Filing Date

Oct 3, 2022

Trademark by

SAPORO SA

Classification Information

Data loggers, namely, computer hardware and recorded software for data collection and running maintenance, downloadable computer security software for scanning and penetration testing of computers and networks to assess information security vulnerability, administering digital keys, operating video surveillance equipment; computer peripheral devices for security applications on the Internet, on computer and communication networks and for computers; electric or electronic apparatus, instruments and equipment enabling monitoring, detecting and analyzing and combatting intrusions or attempted intrusions of computers and/or on networks, namely, network access server hardware, security token hardware, electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; data processing equipment and computers; downloadable database and application integration software; downloadable data search software; downloadable database management software; downloadable data processing programs; downloadable software for remote monitoring and analysis; downloadable software for content filtering and inspection, access management, authorization management and monitoring concerning the use of the Internet; recorded computer security software for scanning and penetration testing of computers and networks to assess information security vulnerability, administering digital keys, operating video surveillance equipment; downloadable software, electronic and computer equipment in the nature of computer peripherals and computer systems comprised of computer hardware for collecting, storing, processing, managing, encrypting and decrypting data; recorded software, electronic and computer equipment in the nature of computer peripherals and computer systems comprised of computer hardware for protecting and securing the integrity of data and preventing data loss; electronic device for access, authentication or authorization control, namely, network access server hardware, security token hardware, USB computer access control key

Electrical and Scientific Apparatus

Commercial management; commercial business administration, organization consulting and management services; data collection into computer databases and data processing services relating to the security of computers, computer and communication networks and computer systems, data encryption and decryption, access management, authorization management and monitoring of the use of the Internet, decisions and advice in the event of detection of intrusions or intrusion attempts in computers, computer and communication networks or computer systems, of threats to computer hardware and software and computer systems, data loss prevention and computer service evaluation

Advertising and Business

Computer software design, development, installation and maintenance service; advice and information on computer technology and computer security, namely, consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others and computer security consultancy; IT integration services, namely, consultancy services in the field of integration of computer systems and computer-controlled devices; computer and technology services for securing computer data and personal and financial information and for detecting unauthorized access to data and information, namely, computer virus protection services, data encryption services, electronic monitoring of personal identification information for detecting identity theft via the Internet; external backup services for computer hard drive data and electronic data storage services; hosting and providing Internet platforms, namely, hosting the software of others on a virtual private server and platform as a service (PAAS) featuring computer software platforms for scanning and penetration testing of computers and networks to assess information security vulnerability, administering digital keys, operating video surveillance equipment; monitoring of computer systems for security purposes, namely, monitoring of computer systems by remote access to ensure proper functioning, monitoring of computer systems to detect breakdowns, monitoring of computer system operation by remote access; monitoring of computer systems for detecting unauthorized access or data breach; data security services in the field of digital assets, namely, data security consultancy, computer security threat analysis for protecting data, data encryption services; development of software for online operating and presenting of results of monitoring on computer and communication networks; development of software for the online operation and presentation of personal and targeted information on companies or individuals and online reputation management; research and development of new products for others; scientific research in the field of analyzing crimes and the security of information, computers, communications and computer networks and computer systems; computer security for preventing piracy and information deterioration, namely, computer security threat analysis for protecting data, computer security consultancy, computer security services in the nature of administering digital certificates; recovery of computer data, lost and/or deleted; remote monitoring of computer systems and computer and communication networks to ensure proper functioning; computer programming for others in the field of computer security; computer security services, namely, implementation of software of security measures for preventing risks of intrusion into computers, computer and communication networks and computer systems, and in response to critical incidents in the context of breaches of the security of information, computers, computer and communication networks and computer systems; scientific research and providing advice in the nature of computer security consultancy in the field of analysis of vulnerability, risk and the security of computers, computer systems and computer and computer communication networks; computer security threat analysis for protecting data, computer security consultancy, computer security services in the nature of administering digital certificates in the field of computer security and the security of computer and communication networks; technological expertise and technological advice in the nature of computer security consultancy to others in relation to the protection of the intellectual property rights thereof; appraisals, analysis and management of risk in the field of the security and safety of computers, computer and communication networks and computer systems, namely, computer security threat analysis for protecting data, computer security consultancy, computer security services in the nature of administering digital certificates; advisors' services relating to the security of computers and/or on networks, namely, computer security consultancy; provision of information relating to computer technology via a website relating to the security of computers and/or on networks; rental of computer database integration and management software; computer code writing

Computer and Scientific