EUTM file information

018473128

APPGATE - SECURE ACCESS, WITH CONFIDENCE


May 16, 2021

Trademark Summary

The trademark application APPGATE - SECURE ACCESS, WITH CONFIDENCE was filed by Appgate Cybersecurity, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on June 14, 2021, and it was registered by office on September 21, 2021 without any oppositions.

The application was filed in English (German was selected as the second language).

Change of name and address of the trademark registration was recorded on November 17, 2021. Change of name and address of the trademark registration was recorded on January 18, 2022.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable computer search engine software
    2. Downloadable enterprise software in the nature of a database for non-transactional data and a search engine for database content
    3. Downloadable computer software for network security assessment and testing
    4. Downloadable computer software for information security analysis, namely, forensic and auditing software used to determine security weakness in software and software applications
    5. Downloadable electronic fraud and identity theft protection computer software
    6. Downloadable software for online fraud protection, namely, providing safe browsing to users in e-commerce transactions, online financial transactions and online communications
    7. Downloadable software for identifying and authenticating users in e-commerce transactions, online financial transactions and online communications
    8. Recorded computer software for fraud protection by providing safe browsing to users in e-commerce transactions, online financial transactions and online communications, recorded on a usb flash drive
    9. Downloadable computer software in the field of data security for secure network access, data and software security, encryption
    10. Downloadable content compliance and governance computer software, namely, downloadable enterprise test management software to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies
    11. Downloadable computer software for providing document, data and information security, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information
    12. Recorded computer software for computer network security and accessing computer networks
    13. Downloadable computer software for verifying and correcting web-sites to meet federal accessibility standards software for use in data security for secure network access, data and software security, encryption, content compliance and governance
    14. Recorded computer software for use in compliance management and risk analysis in the fields of computer and network security
    15. Downloadable software for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decisioning software systems
    16. Downloadable computer software for data analytics, comprehensive data processing, visual analytics, machine learning and document production for use in digital investigations, e-discovery, intelligence mining and corporate communication compliance.
  • The mark was filed in class 42 with following description of goods:
    1. Software as a service (saas) featuring software in the fields of data security for secure network access, data and software security, encryption, and content compliance and governance
    2. Providing temporary use of an online non-downloadable software application featuring enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies
    3. Providing temporary use of online non-downloadable software for securing documents, data, and information, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information
    4. Software as a service (saas) services, namely, hosting software for use by others for use securing documents, data and information, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information
    5. Evaluation of computer systems, namely, analysis of internal computer systems, extranet computer systems and global computer network systems, for others
    6. Implementing computer software systems for others
    7. Designing, developing, implementing and monitoring computer networks and computer systems for others
    8. Computer and network monitoring services, namely, monitoring technological functions of websites and computer network systems for others, load balancing of servers, and computer network security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
    9. Computer and network monitoring services, namely, scanning and penetration testing of computers and networks to assess information security vulnerability, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
    10. Providing temporary use of online, non-downloadable software for accessing and using a cloud computing network
    11. Software as a service (saas), namely, hosting software applications for others in the fields of information technology (it) systems and information security management
    12. Application service provider (asp) services, namely, hosting computer software applications of others
    13. Consulting services in the field of software as a service (saas)
    14. Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and internet services
    15. Providing temporary use of online, non-downloadable computer software for compliance management and risk analysis in the fields of computer and network security
    16. Providing temporary use of online non-downloadable network security software
    17. Providing temporary use of online non downloadable identity verification software
    18. Providing temporary use of online non downloadable network auditing software in the fields of secure communications and data networks
    19. Computer consultation in the nature of consultation about the maintenance and updating of computer software and computer technology consultancy and providing technical consulting information in the field of internet and network security and secure transmission of data and information
    20. Technical consulting services in the field of electronic storage and archiving of data for others
    21. Infrastructure as a service (iaas), namely, providing remotely accessible storage capacity in the nature of electronic storage of data
    22. Technical support services, namely, remote administration and management of virtual infrastructure storage
    23. Storage services for archiving of electronic data
    24. Providing technical information via a website in the field of electronic data storage products and services
    25. Computer security services, namely, monitoring of computers, websites, computer networks and communications network systems for security purposes
    26. Computer networks and communications network security services in the nature of intrusion protection via firewall software, computer security threat analysis for protecting data, managed IT system security services in the nature of computer security consultancy to assess information security vulnerability
    27. Computer security incident response services in the nature of software as a service services (SaaS) featuring software for computer security incident mitigation and resolution, computer forensic services, and penetration testing of computers and networks to assess information security vulnerability
    28. Providing electronic user authentication services using software technology for e-commerce transactions and online software applications to others in the field of voice and data communication services via computer networks
    29. Computer security services in the nature of the issuance and validation of digital certificates and other electronic security credentials in the nature of electronic access codes for others
    30. Identity as a service (idaas), namely, providing cloud-based computer network identification verification and authentication services via software technology for security purposes
    31. Computer security services, namely, secure hosted electronic storage of passwords, digital credentials and electronic identity information relating to persons, accounts and devices for security purposes
    32. Providing temporary use of online, non-downloadable software for fraud prevention and access authorization for verifying a user's true identity, both on-line and on-site, in the fields of controlling access to information, medical records, computer systems, websites, online services, e-commerce and financial transactions
    33. Consulting services in the field of computer security and communications network security
    34. Providing technical information via a website in the fields of internet, network, computer and data security, as well as online fraud and identity theft protection
    35. Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
    36. Computer services, namely, providing search engines for obtaining data and information on a global computer network
    37. Computer services, namely, providing a website featuring a media aggregator and search engine for internet content
    38. Providing a search engine on the Internet for information
    39. Provision of internet search engines
    40. On-line non-downloadable software, provided via a website, that enables users to scan websites and identify malicious code injections, providing an assessment of the type and risk level of malware attacks, theft of credentials, and theft of other forms of personal data
    41. On-line non-downloadable software, provided via a website, that enables users to obtain malware injection attack visibility by taking a screenshot of a malware-injected web page, enhancing attack detection accuracy and assisting in forensic investigations
    42. Providing temporary use of non-downloadable electronic fraud, identity theft and cyberattack protection and monitoring software
    43. Software as a service (saas) services featuring software for reporting, policy analytics and data visualization relating to domain-based message authentication, reporting, conference, and compliance with applicable standards for the same
    44. Providing temporary use of non-downloadable electronic fraud and identity theft protection software
    45. Providing online non-downloadable secure software for providing safe browsing to users in e-commerce transactions, online financial transactions and online communications
    46. Electronic information security consulting, namely, penetration testing of computers and networks to assess information security vulnerability, analysis of software application code, and computer security threat analysis of software applications for protecting data
    47. Computer security services for protecting data and information from unauthorized access, in the nature of electronic monitoring of computer networks for cyber attack incidents and providing information regarding such incidents
    48. Online fraud protection services, namely electronic monitoring of personally identifying information and electronic transaction activity to detect fraud and identity theft via the internet
    49. Computer security services for protecting data and information from unauthorized access, in the nature of electronic monitoring of credit reports, Internet traffic and public records to facilitate the prevention of identity theft and fraud
    50. Electronic fraud protection services, namely, design and implementation of software and technology solutions for the purpose of electronic brand monitoring, to protect against counterfeiting, tampering, and diversion
    51. Electronic identification services, namely, providing user authentication services using technology for e-commerce transactions, online financial transactions, and online communications
    52. Providing on-line non-downloadable software for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decision-making software systems
    53. Software as a service (SAAS) services, namely, hosting software for use by others for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decision-making software systems
    54. Providing online, nondownloadable computer software for data analytics, comprehensive data processing, visual analytics, machine learning and document production for use in digital investigations, e-discovery, intelligence mining and corporate communication compliance
    55. Consulting services in connection with enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies.
Trademarkers