87930200
May 21, 2018
Oct 8, 2019
Active Trademark
Apparatus for recording, transmission or reproduction of sound or images; Blank magnetic data carriers in the nature of recording discs; compact discs and DVDs featuring computer software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; data processing equipment, computers, computer terminals, computer peripherals; Computer hardware; computer software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; alarms, namely, fire alarms, sound alarms and burglar alarms; computer memory devices; computer operating programs, recorded; computer peripheral devices; computer programs in the nature of downloadable software, namely, computer anti-virus software, computer security software, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware; computer software, recorded, namely, computer anti-virus software, computer security software, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware; computer network security software; computer security software; USB computer security keys; anti-spyware software; computer anti-virus software; software for ensuring the security of electronic mail; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for identity security, namely, software for authenticating user identification and software for detecting identity fraud; computer software for authentication and identity management information security; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in vulnerability scanning of networks, websites and electronic devices; sound recording, video recordings and data recordings in the nature of audio and video recording all featuring instructions of internet security, computer security, and computer virus protection information; software for detecting, eradicating and preventing computer viruses; software for data encryption; software for analysing and recovering data; software for computer system backup, data processing, data storage, file management and database management; pre-recorded computer programs for personal information management, database management software, character recognition software, telephony management software, electronic mail and messaging software, mobile telephone software, namely, mobile telephone anti-virus software, mobile telephone security software and mobile telephone operating software; database synchronization software; computer programs for accessing, browsing and searching online databases; computer software for the synchronization of data between a remote station or device and a fixed or remote station or device; Downloadable electronic publications in the nature of books, pamphlets, brochures, newsletters, journals, magazines and periodicals in the field of internet security, computer security and computer virus protection; Cyber security software in the nature of anti-spyware software, software for secure network operations and software for protecting personal details on the internet; software for reporting, monitoring, analysing and tracing computer viruses; computer software for recovery of computer data; computer software for warning of computer and internet security threats and viruses; computer software to enhance the capabilities of other computer software, mobile phone software, computer operating software, mobile phone operating software; software to analyse and monitor the security vulnerabilities of other software; computer software for testing vulnerability in computers and computer networks; computer software to allow users to reports bugs, viruses and security vulnerabilities in other software; computer software to allow users to provide feedback on other software; software to allow users to identify and report issues with other software
Electrical and Scientific ApparatusAdvertising; business management; business administration; Providing office functions; arranging subscriptions to telecommunication services for others; Professional business consultancy; business networking; Consumer advice ship in the nature of providing commercial information and advice for consumers in the choice of products and services; compilation of information into computer databases; file management, namely, computerized file management; organization of exhibitions for commercial or advertising purposes; organization of trade fairs for commercial or advertising purposes; systemization of information into computer databases; business data analysis; compiling and maintaining online business and commercial information directories; computerized file management; consumer research; consumer response analysis in the nature of consumer survey services and consumer trend analysis; public opinion surveys; conducting market surveys; customer feedback programmes in the nature of responding to customer inquiries for others in the field of computers; retail store services featuring apparatus for recording, transmission or reproduction of sound or images, magnetic data carriers, recording discs, compact discs, DVDs and other digital recording media, data processing equipment, computers, computer terminals, computer peripherals, Computer hardware, computer software, alarms, computer memory devices, computer operating programs, recorded, computer peripheral devices, computer programmes in the nature of programs, recorded, computer programs in the nature of downloadable software, computer software, recorded, network security software, security software, network security keys, USB security keys, anti-spyware software, anti-virus software, software for ensuring the security of electronic mail, computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices, computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services, computer software for use in analysis and reporting of firewall log data, computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software, computer software for identity security, computer software for authentication and identity management information security, computer software for detecting identity fraud, computer software and firmware for the management, transmission, and storage of data and information, computer software for use in vulnerability scanning of networks, websites and electronic devices, sound, video and data recordings, software for detecting, eradicating and preventing computer viruses, software for data encryption, software for analysing and recovering data, software for computer system backup, data processing, data storage, file management and database management, pre-recorded computer programs for personal information management, database management software, character recognition software, telephony management software, electronic mail and messaging software, mobile telephone software, database synchronization software, computer programs for accessing, browsing and searching online databases, computer software for the synchronization of data between a remote station or device and a fixed or remote station or device, Downloadable electronic publications, Cyber security software, software for reporting, monitoring, analysing and tracing computer viruses, computer software for recovery of computer data, computer software for warning of computer and internet security threats and viruses, computer software to enhance the capabilities of other computer software, mobile phone software, computer operating software, mobile phone operating software, software to analyse and monitor the security vulnerabilities of other software, computer software for testing vulnerability in computers and computer networks; Arranging and conducting of business colloquiums; Arranging and conducting of business conferences; Arranging and conducting of business congresses; information, advisory and consultancy services relating to all the aforesaid
Advertising and BusinessEducation, namely, educational classes in the field of computer security, IT security and internet security; Providing of training, namely, IT training services, computer security training services and internet security training services; Organizing community sporting and cultural activities; Arranging and conducting of colloquiums in the field of computer security and IT training; Arranging and conducting of educational conferences; Arranging and conducting of educational congresses; Arranging and conducting of seminars in the field of computer security and IT training; Arranging and conducting of educational symposiums; Arranging and conducting of professional training workshops; Electronic desktop publishing; Providing on-line electronic publications, not downloadable, in the nature of books, pamphlets, brochures, newsletters, journals, magazines and periodicals in the field of internet security, computer security and computer virus protection; Publication of electronic books and journals on-line; Publication of texts, other than publicity texts; education in the nature of providing classes and training in the field of cyber security, security software, internet security, computer virus protection and computer security vulnerabilities; Arranging and conducting of educational colloquiums, conferences, congresses, seminars, symposiums and workshops in the nature of training in the field of cyber security, security software, internet security, computer virus protection and computer security vulnerabilities; Providing a website featuring on-line non-downloadable publications, namely, magazines, magazines supplements, magazine sections, newsletters, pamphlets, brochures, exhibition programs, reports, books and directories in the field of computer technology, computer programming, computer virus protection and computer security; information, advisory and consultancy services relating to all the aforesaid
Education and EntertainmentDesign and development of computer hardware and software; Computer programming; Computer software consultancy; Computer software design; Updating of computer software; Computer system analysis; Computer system design; Computer virus protection services; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Consultancy in the design and development of computer hardware; Creating and maintaining web sites for others; Data conversion of computer programs and data, not physical conversion; Duplication of computer programs; Installation of computer software; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Providing search engines for the internet; Recovery of computer data; Rental of computer software; Rental of web servers; designing, maintenance, testing and analysis of computer software and computer programs; designing, testing and analysis of computer systems; monitoring of computer systems and computer networks of others to ensure proper functioning and to detect breakdowns; integration of computer database systems; application service provider (ASP), namely, hosting computer software applications of others; providing temporary use of online non-downloadable software development tools; software as a service (SaaS) services featuring software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; platform as a service (PaaS) featuring computer software platforms for reporting bugs in other software, computer software platforms for reporting security threats and vulnerabilities in other software and computer networks, computer software platforms for fixing bugs and security vulnerabilities in other software and computer software platforms for alerting customs to security threats and vulnerabilities in other software and computer networks; encryption and decryption and authentication of electronic documents; research and design of network security software; computer software research; design of computer software for use with wireless networks and devices; development of software for secure network operations; development, design, and implementation of software in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; design of software for protection of computer network firewalls, servers and other network devices from unauthorized access; design of software for the purpose of scanning, detection and removal of viruses, worms, adware and spyware or any other type of malware; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; provision of security services for computer networks, computer access and computerised transactions, namely, computer security consultancy, data security consulting, computer security threat analysis for protecting data; data security services, namely, data security consulting and computer security threat analysis for protecting data; internet security services, namely, internet security consultancy; monitoring of computer systems for security purposes, namely, for detecting unauthorised access or data breach; maintenance of computer software relating to computer security and prevention of computer risks; computer software technical support services, namely, troubleshooting of computer software problems; provision of technical support in the operation of computing networks, namely, monitoring technological functions of computer systems; IT support services, namely, help desk services, 24/7 service desk services for IT infrastructure and operating systems; support in the nature of repair, updating and installation of computer software and maintenance services for computer software; provision of on-line support services for computer program users, namely, help desk services; software as a service (SAAS) services featuring software to enhance the capabilities and features of other software and nondownloadable online software; preparation of technology reports relating to computing; expert reporting services relating to technology; providing a website featuring online non-downloadable software that enables users to create, modify, update, collect, maintain, analyse, report and transfer online surveys, questionnaires and other data collection formats; software as a service (SAAS) services featuring software which allows users to reports bugs, viruses and security vulnerabilities in other software; software as a service (SAAS) services featuring software which allows users to provide feedback on other software; software as a service (SAAS) services featuring software which allows users to identify and report issues with other software; computer security services, namely, providing a website featuring online non-downloadable software that enables users to identify and report security issues and vulnerabilities of computer software; information, advisory and consultancy services relating to all the aforesaid
Computer and Scientific