on 22 Feb 2022
Last Applicant/ Owned by
Unit L6, 5 Howe Street, Observatory
Cape Town
ZA
7925
Serial Number
90070415 filed on 23rd Jul 2020
Registration Number
6649335 registered on 22nd Feb 2022
Correspondent Address
Jonathan A. Hyman
Filing Basis
1. filed as use application
2. use application currently
Disclaimer
NO DATA
Design and development of computer software; Computer security consultancy; Computer software consultancy; Computer system analysis; Computer virus protection services; Data encryption services; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic monitoring of personally identifying information to detect identity theft via the inter Read More
Design and development of computer software; Computer security consultancy; Computer software consultancy; Computer system analysis; Computer virus protection services; Data encryption services; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic monitoring of personally identifying information to detect identity theft via the internet; Internet security consultancy; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SAAS) services featuring software for IT security, monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, access or data breach; Software as a service (SAAS) services featuring software for issuing honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization; User authentication services using single sign-on technology for online software applications; User authentication services using technology for e-commerce transactions
14th Aug 2015
14th Aug 2015
Recorded and downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable software, downloadable mobile applications, and downloadable computer programs in the field of IT security all of the foregoing for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer operating programs; Recorded and downloadable computer software applications in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software platforms in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software for issuing honeypots, namely, recorded and downloadable computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization
14th Aug 2015
14th Aug 2015
No 90070415
No Service Mark
No VONS023.003T
Yes
No
No
No
No
No
No
No
03.15.24 -
Stylized birds and bats
03.15.25 -
Other birds
26.01.02 -
Plain single line circles
26.09.03 -
Incomplete squares
Status Date | Action Taken |
---|---|
22nd Feb 2022 | REGISTERED-PRINCIPAL REGISTER |
13th Jan 2022 | EXTENSION OF TIME TO OPPOSE PROCESS - TERMINATED |
04th Aug 2021 | EXTENSION OF TIME TO OPPOSE RECEIVED |
06th Jul 2021 | PUBLISHED FOR OPPOSITION |
06th Jul 2021 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
16th Jun 2021 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
27th May 2021 | APPROVED FOR PUB - PRINCIPAL REGISTER |
12th May 2021 | TEAS/EMAIL CORRESPONDENCE ENTERED |
11th May 2021 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
11th May 2021 | CORRESPONDENCE RECEIVED IN LAW OFFICE |