Sophos Limited

United Kingdom

Back to Profile

1-8 of 8 for Sophos Limited Sort by
Query
Trademark
Canada - CIPO
Excluding Subsidiaries
Aggregations Reset Report
Date
2022 1
2021 5
Before 2019 2
NICE Class
09 - Scientific and electric apparatus and instruments 6
42 - Scientific, technological and industrial services, research and design 6
41 - Education, entertainment, sporting and cultural services 4
16 - Paper, cardboard and goods made from these materials 2
38 - Telecommunications services 2
See more
Status
Pending 2
Registered / In Force 6
Found results for  trademarks

1.

SOPHOS CYBERSECURITY DELIVERED

      
Application Number 222794800
Status Pending
Filing Date 2022-05-09
Owner Sophos Limited (United Kingdom)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer hardware; wireless access points; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; network monitoring hardware and software; downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; downloadable computer software for IT infrastructure and cyber security automation; downloadable electronic publications and data in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases; parts, fittings and accessories for all of the aforesaid goods. (1) Education; providing of training; educational services; conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith; information, consultancy and advisory services relating to the aforesaid. (2) Software authoring; computer services for the protection of software; data security services; computer software technical support services; troubleshooting of computer software problems; technical advice related to computer and network security; installation, maintenance and repair of computer software; computer security consultancy; computer software consulting services; computer technology consulting services; computer security consultancy services; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; computer software technical support services; monitoring of computer systems for security purposes; computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; technology consulting services in the field of cloud computing; technology consulting services in the field of cybersecurity; technology consulting services in the field of IT infrastructure and cybersecurity automation; providing information in the field of security, via a website; providing on-line commercial orders in the field of computer hardware and computer software, via a website; tracking, monitoring, and reporting for purposes of protecting against data theft, identity theft and fraud; information, consultancy and advisory services relating to the aforesaid.

2.

SOPHOS

      
Application Number 212643500
Status Registered
Filing Date 2021-03-31
Registration Date 2024-01-05
Owner Sophos Limited (United Kingdom)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer hardware; wireless access points devices namely, wireless routers; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption and decryption of digital files; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software namely software used to continually track, monitor, and audit whether business processes are aligned with applicable laws, organizational policies, and the standards of consumers and business partners; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking in the nature of verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from internet content and verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from electronic data; downloadable electronic publications and data namely brochures, newsletters, journals, reports and manuals in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases. (1) Education in the field of information technology, computers, data security, computer security, and network security; providing of training in computer education namely distribution of course materials in connection therewith in printed or electronic format; educational services namely conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith; conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith. (2) Computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer security consultancy; computer software consultancy; computer technology consultancy; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, nondownloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; providing online, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption and decryption of digital files; providing on-line, non-downloadable computer compliance software namely, software for use in tracking and managing of compliance with security policies; providing on-line, non-downloadable software for use in internet content filtering, secure internet content management, internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; computer software technical support services; monitoring of computer systems for security purposes.

3.

SOPHOS CLOUD OPTIX

      
Application Number 212642800
Status Pending
Filing Date 2021-03-29
Owner Sophos Limited (United Kingdom)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Outsource service providers in the field of information technology; technical advice relating to operation of computers; technical support services; 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; troubleshooting of computer software problems; monitoring technological functions of computer network systems; computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer software consulting services; computer technology consulting services; computer security consultancy services; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for securing users, and security policies; software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; software as a service (SAAS) services featuring software for computer network and computer system security; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; 24/7 monitoring of servers and web and database applications and notification of related events and alerts; remote and on-site services for monitoring, administration and management of public and private cloud computing and application computing systems; computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for securing users, and security policies; software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, and traffic flow; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, and computer systems; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, and computer systems; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, and computer systems; software as a service (SAAS) services featuring software for asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; computer virus protection services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources based on assigned credentials; providing information on data security and computer security; monitoring of computer systems for security purposes.

4.

SOPHOSLABS INTELIX

      
Application Number 212926100
Status Registered
Filing Date 2021-03-29
Registration Date 2024-01-05
Owner Sophos Limited (United Kingdom)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer programming services for the protection of software, data security services, computer software technical support services, installation, maintenance and repair of computer software, computer security consultancy, computer software consultancy, computer technology consultancy, computer security consultancy services, consultancy in the design and development of computer hardware, computer software, hardware, firmware, network, and computer security consulting services, providing on-line, nondownloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices, providing online, non-downloadable software for enforcing data policies, providing on-line, non-downloadable software for encryption and decryption of digital files, providing on-line, non-downloadable computer compliance software namely, software for use in tracking and managing of compliance with security policies, and monitoring and audit whether business processes are aligned with applicable laws, organizational policies, and the standards of consumers and business partners, providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking, software as a service (SaaS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices, platform as a service (PaaS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices, cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices, computer development services, computer programming services, computer virus protection services, computer security services by way of notification of unauthorized electronic messages and related computer attacks, computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, providing information on data security, and computer security, troubleshooting of computer software problems, technical advice related to computer and computer network security, computer software technical support services, monitoring of computer systems for security purposes, information, consultancy and advisory services relating to the aforesaid.

5.

SOPHOS CENTRAL

      
Application Number 211463500
Status Registered
Filing Date 2021-03-26
Registration Date 2024-01-05
Owner Sophos Limited (United Kingdom)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

(1) Downloadable electronic publications, articles and documents namely consolidated reports in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; downloadable electronic data files featuring documentation namely real-time data reports and automated incident responses, operational data, alerts, and news updates in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; downloadable computer software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices namely desk top computers, laptops, notebook computers, tablet computers, mobile phones; computer hardware; wireless access points; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies in disclosures of enterprise networks and automated policy creation, monitoring, tracking, enforcement, and remediation of policy violations; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption and decryption of digital files; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, emails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software namely software used to continually track, monitor, and audit whether business processes are aligned with applicable laws, organizational policies, and the standards of consumers and business partners; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking in the nature of verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from internet content and verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from electronic data; downloadable electronic publications and data namely brochures, newsletters, journals, reports and manuals in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases.

6.

SOPHOS INTERCEPT X

      
Application Number 213861000
Status Registered
Filing Date 2021-03-26
Registration Date 2024-01-05
Owner Sophos Limited (United Kingdom)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

(1) Computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies in disclosures of enterprise networks and automated policy creation, monitoring, tracking, enforcement, and remediation of policy violations; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption and decryption of digital files; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software namely software used to continually track, monitor, and audit whether business processes are aligned with applicable laws, organizational policies, and the standards of consumers and business partners; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking in the nature of verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from internet content and verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from electronic data; downloadable electronic publications and data namely brochures, newsletters, journals, reports and manuals in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; computer hardware; wireless access points.

7.

SOPHOS

      
Application Number 180471000
Status Registered
Filing Date 2016-10-14
Registration Date 2022-02-11
Owner Sophos Limited (United Kingdom)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 20 - Furniture and decorative products
  • 21 - HouseHold or kitchen utensils, containers and materials; glassware; porcelain; earthenware
  • 25 - Clothing; footwear; headgear
  • 28 - Games; toys; sports equipment
  • 35 - Advertising and business services
  • 37 - Construction and mining; installation and repair services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer hardware (2) Wireless telecommunications devices, namely, wireless telephones and smartphones, handheld computers, tablet computers, netbooks, laptop computers, radio transceivers configured as data sticks with USB connectivity, wireless access points, wireless signal repeaters, and wireless modems (3) Computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data security, security of endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies in disclosures of enterprise networks and automated policy creation, monitoring, tracking, enforcement, and remediation of policy violations; computer anti-virus software; computer anti-malware software; computer anti-spyware software; downloadable computer data-security programs; computer compliance software, namely software used to continually track, monitor, and audit whether business processes are aligned with applicable laws, organizational policies, and the standards of consumers and business partners (4) Computer anti-spam software; computer anti-adware software (5) Computer software for encryption (6) Computer software for use in threat-reduction scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints (7) Computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking (8) Downloadable electronic publications in the nature of magazines in the field of data security and security of endpoints, computer systems, computer networks, the Internet and mobile devices (9) Mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases (10) Paper and cardboard; printed matter, namely, books, magazines, greeting cards, pamphlets, brochures, stickers, paper bags; paper stationery, namely notebooks, notepads; office requisites, except furniture, namely filing trays, file folders, adhesive tape dispensers, paper coasters, staplers, paper cutting knives, pens, pencils, markers, rubber bands, pencil sharpeners, letter openers, erasers; instructional and teaching material, except apparatus, namely instruction books and manuals; plastic materials for packaging, namely plastic bags, plastic bubble packs, plastic film for packaging (11) Plastic boxes (12) Containers, drinking vessels and containers, namely cups, mugs, beverage bottles, lunch boxes, food storage containers (13) Clothing, namely jackets, shirts; footwear, namely socks; headgear, namely caps, hats (14) Games and playthings, namely board games, card games, action skill games, return tops, dolls and action figures, playhouses, slides and sandboxes, stuffed toys, toy bicycles, play tents, decorations for Christmas trees; gymnastic and sporting articles, namely bicycles and sporting apparatus and articles for playing the games of golf, tennis, squash, badminton, racquetball, table tennis, basketball, volleyball, netball, softball, baseball, rugby, cricket, boules, snooker, billiards and pool, namely nets, balls, racquets, cues, bats and clubs for these sports; surfboards; flying discs (15) Skateboards (1) Providing information relating to the sale of the use of the security assurance best practices of others in the field of cloud computing (2) Administration of a business customer relationship program for enabling participants to receive expedited services in the field of data security, computer security, and network security; business administration services (3) Distributorship services featuring computer hardware and computer software (4) Database management; wholesale sales of computer hardware and computer software through direct solicitation by distributors directed to end-users (5) Installation, maintenance and repair of computer hardware; technical support services, namely troubleshooting in the nature of the repair of computer hardware (6) Providing access to a website used to place on-line commercial orders in the field of computer hardware and computer software (7) Educational services, namely conducting educational technical demonstrations, presentations, workshops, and training seminars, all in the fields of computer information technology, computers, data security, computer security, and network security and distribution of training materials in connection therewith (8) Technical support services, namely troubleshooting of computer software problems, technical advice in the field of computer and network security (9) Computer network security services (10) Computer software technical support services, namely installation, maintenance and repair of computer software; computer security consultancy; computer consulting services, namely computer software, hardware, firmware network, and computer security consulting services (11) Providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data security, security of endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software, namely software used to continually track, monitor, and audit whether business processes are aligned with applicable laws, organizational policies, and the standards of consumers and business partners; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet contentchecking, and data content checking; software as a service featuring software for use in managing, monitoring, protecting, authenticating, and securing data security, security of endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service featuring software for use in managing, monitoring, protecting, authenticating, and securing data security, security of endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data security, security of endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; notification of unauthorized electronic messages and related computer attacks; enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile and network resources based on assigned credentials (12) Monitoring of computer systems for security purposes; providing information in the field of computer network security via a website (13) Providing information on computer, network, server and data privacy, data security, and computer security

8.

SOPHOS

      
Application Number 122509300
Status Registered
Filing Date 2004-07-27
Registration Date 2008-01-08
Owner Sophos Limited (United Kingdom)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer software and computer programs, namely, systems and network security software directed to internet security, e-mail management, e-mail filtering, anti-virus, anti-spam, e-mail policy management; datastorage media for the storing of computer progams or bearing recorded computer programs, namely, diskettes, compact disks, DVDs, and computer hard drives; material in electronic form supplied on-line fromdatabases or from facilities provided on the internet, including web-sites, namely manuals, bulletins, newsletters and data sheets relating to internet security, e-mail management, e-mail filtering, anti-virus, anti-spam, e-mail policy management; information relating to internet security. (2) Printed matter and printed publications, namely, manuals, data sheets, and newsletter; all relating to computer software and computer programs. (1) Providing access to information held on computer databases. (2) Providing information and advice concerning computer programs and computer software; provision of information and advice on internet security threat outbreaks, technical support, updates and maintenance, training, professional services, installation and configuration on-line from a computer database or provided from facilities on the Internet. (3) Computer program and computer software consultancy services.