Mark Identification

SOPHOS

Serial Number

97043184

Filing Date

Sep 24, 2021

Trademark by

SOPHOS LIMITED

Classification Information

(Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key(Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key

Electrical and Scientific Apparatus

(Based on Use in Commerce) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training(Based on 44(d) Priority Application) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training(Based on 44(e)) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the field of information technology, computers, data security, computer security, and network security and distribution of training material in connection therewith; Educational services, namely, providing on-line threat simulations and tutorials in the field of cybersecurity; Technical consulting in the field of cybersecurity risk management training

Education and Entertainment

(Based on Use in Commerce) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems(Based on 44(d) Priority Application) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems(Based on 44(e)) Computer security consultancy; Computer virus protection services; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems

Computer and Scientific