EUTM file information

018191409

SECMENTIS


February 3, 2020

Trademark Summary

The trademark application SECMENTIS was filed by SECMENTIS LTD, a corporation established under the laws of the Republic of Cyprus (the "Applicant"). The application was published for oppositions on February 18, 2020, and it was registered by office on May 28, 2020 without any oppositions.

The application was filed in English (French was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable software for cyber security, computer security and computer network security
    2. Computer software for cyber security assessment, security hardening, vulnerability management, vulnerability assessment, vulnerability exploitation, and penetration testing
    3. Computer software for cyber threat detection and prevention
    4. Computer software for detection, blocking and remediation of cyber attacks
    5. Computer software for detecting, documenting, analyzing, remediating, and blocking cyber threats including trojans, worms, viruses, malware, adware, spyware, botnets, and advanced persistent threats (APTs)
    6. Computer software for monitoring, detection, and prevention of cyber security threats in computer networks, network devices, applications, electronic devices, computer systems
    7. Computer software for computer and computer network intrusion detection and intrusion prevention
    8. Computer software and hardware for digital security
    9. Computer software for network security, computer security, information security, data security, cyber threat intelligence, cyber threat prevention, computer surveillance, network surveillance, network traffic monitoring
    10. None of the foregoing relating to software for use in business fields for the purpose of driving decision making and improving business operations, performance and strategy.
  • The mark was filed in class 42 with following description of goods:
    1. Software As a Service (SAAS) and non-downloadable cloud-based software in the fields of cyber security, computer security and computer network security
    2. Technical advisory and consulting services in the field of cyber security, external network penetration testing, internal network penetration testing, web application penetration testing, wireless penetration testing, mobile application penetration testing, physical penetration testing, hardware penetration testing, Payment Card Industry (PCI) compliance reviews, computer security assessments, computer network security assessments, computer hardware security assessments
    3. Managed cyber security services, namely, intrusion detection, intrusion prevention, cyber security threat detection and prevention, network traffic monitoring for cyber security purposes
    4. Implementation and integration of technology solutions in the field of cyber security
    5. Computer security consultancy in the field of security assessment and penetration testing of computers, network devices, servers, desktops, computer networks to assess information security vulnerability
    6. Advisory, information and consulting services in the fields of cyber security, network security, data security, computer security
    7. Providing temporary use of non-downloadable cloud-based software for cyber security, computer security and computer network security
    8. Computer technology support services, namely, providing remote service desk and cyber security helpdesk services
    9. Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software for security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention (DLP), application security, endpoint security, and forensics and incident response
    10. Software As a Service (SAAS) services featuring cyber security software for computer and network security assessment, vulnerability assessment and vulnerability management
    11. Research and implementation of cyber security software for computer network and application security, vulnerability assessment, vulnerability exploitation, threat detection and threat prevention
    12. Research and development of computer software in the fields of cyber security, computer security, data and information security, and computer network security
    13. Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes
    14. Providing a web site featuring information about cyber security
    15. None of the foregoing relating to software for use in business fields for the purpose of driving decision making and improving business operations, performance and strategy.
Trademarkers