EUTM file information

018279605

CYBERGATOR


July 28, 2020

Trademark Summary

The trademark application CYBERGATOR was filed by Cyberfort Limited, a corporation established under the laws of the United Kingdom of Great Britain and Northern Ireland (the "Applicant"). The application was published for oppositions on September 2, 2020, and it was registered by office on December 10, 2020 without any oppositions.

The application was filed in English (French was selected as the second language).

Deletion of the representative of the trademark registration was recorded on January 6, 2021. Appointment and Replacement of representative of the trademark registration was recorded on January 7, 2021.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer software, recorded
    2. Computer software, downloadable
    3. Security software
    4. Downloadable computer security software
    5. Computer software for network and device security
    6. Computer software for testing vulnerability in computers and computer networks
    7. Computer antivirus software
    8. Computer software for providing network, Internet, and computer security
    9. Computer software for providing intrusion detection and prevention
    10. Computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware
    11. Computer software for the monitoring and control of computer and online activity
    12. Computer software to prevent, diagnose, and repair computer problems
    13. Computer maintenance software
    14. Computer software for the back-up, storage, restoration and recovery of data, folders, and files
    15. Enterprise security software
    16. Computer software for analysis and reporting of firewall log data
    17. Computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software
    18. Computer software for encrypting and authenticating data
    19. Computer software for encryption
    20. Computer software for the encryption and decryption of digital files
    21. Computer software for identity security
    22. Computer software for monitoring computers for security purposes
    23. Computer software for vulnerability scanning of networks and websites
    24. Computer software for detecting malware.
  • The mark was filed in class 35 with following description of goods:
    1. Business risk assessment services
    2. Business risk management services
    3. Advisory services relating to business risk management
    4. Advisory services relating to data processing
    5. Consulting services relating to data processing
    6. Business data analysis services
    7. Business intelligence services
    8. Market intelligence services
    9. Competitive intelligence services
    10. Business analysis and information services, and market research
    11. Business consultancy relating to the administration of information technology
    12. Business services relating to the security of information technology systems
    13. Business services relating to the governance of information technology
    14. Information, advisory and consulting services in relation to all of the aforesaid services.
  • The mark was filed in class 42 with following description of goods:
    1. IT security, protection and restoration
    2. Internet security consultancy
    3. Design and development of internet security programs
    4. Provision of computer risk management programs
    5. Maintenance and updating of computer software relating to computer security and the prevention of computer risks
    6. Consultancy in the field of security software
    7. Computer security system monitoring services
    8. Authentication services for computer security
    9. Data security services
    10. Data security consultancy
    11. Design and development of electronic data security systems
    12. Computer programming services for electronic data security
    13. Computer security threat analysis for protecting data
    14. Computer security services for protection against illegal network access
    15. Provision of data centre facilities
    16. Rental of data centre facilities
    17. Hosting services
    18. Hosting of databases
    19. Hosting of servers
    20. Cloud hosting provider services
    21. Hosting of computerised data, files, applications and information
    22. Hosting of access control as a service (HACaaS) servers and software
    23. Software as a service (Saas) featuring computer software platforms for internet security
    24. Software as a service (Saas) featuring computer software platforms for data security
    25. Software as a service (Saas) featuring computer software platforms for
    26. Penetration testing services
    27. Development and testing of computing methods, algorithms and architecture
    28. Development and testing of software
    29. Application system testing consultancy
    30. Testing of computer hardware
    31. Computer network services
    32. Computer network configuration services
    33. Integration of computer systems and networks
    34. Providing information about the design and development of computer software, systems and networks
    35. Development of software for secure network operations
    36. Consultancy services relating to computer networks
    37. Provision of technical support in the operation and supervision of computing networks
    38. Monitoring of network systems
    39. Development of technologies for the protection of electronic networks
    40. Provision of security services for computer networks, computer access and computerised transactions
    41. Design and development of networks
    42. Recovery of computer data
    43. Computer hardware, software, firmware and infrastructure consultancy services
    44. Computer programming services
    45. Computer systems analysis, design, installation and maintenance services
    46. Computer virus protection services
    47. Analysis, optimisation and monitoring of computer systems
    48. Design and implementation of computer networks
    49. IT consultancy, advisory and information services
    50. IT project management
    51. IT service management
    52. Information, advisory and consulting services in relation to all of the aforesaid services.
Trademarkers