EUTM file information

018528908

ISLAND.IO


August 5, 2021

Trademark Summary

The trademark application ISLAND.IO was filed by Island Technology, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on October 6, 2021, and it was registered by office on January 13, 2022 without any oppositions.

The application was filed in English (French was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable software for surveillance, security, cyber security, cyber security control, cyber security warning, data security, managing business processes, authentication services, and enhancement of business productivity
    2. Downloadable computer software for monitoring and controlling communication between computers and automated machine systems
    3. Downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance
    4. Downloadable software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents
    5. Downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology
    6. Downloadable computer software for use in analyzing and monitoring computer networks and network access
    7. Downloadable computer software for diagnosing industrial and business performance issues
    8. Downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data.
  • The mark was filed in class 42 with following description of goods:
    1. Consulting in the field of cyber security and security software
    2. Providing temporary use of non-downloadable software and applications for surveillance, security, cyber security, cyber security control, cyber security warning, data security, managing business processes, authentication services, and enhancement of business productivity
    3. Testing of security systems
    4. Monitoring of computer systems for detecting unauthorized access or data breach
    5. Monitoring of computer systems to detect breakdowns
    6. Software as a service (SaaS) services featuring software for surveillance, security, cyber security, cyber security control, cyber security warning, data security, managing business processes, authentication services, and enhancement of business productivity
    7. Providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance
    8. Providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents
    9. Providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology
    10. Providing temporary use of non- downloadable software and applications for use in analyzing and monitoring computer networks and network access
    11. Providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues
    12. Providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data.
Trademarkers