mailed
on 23 Dec 2024
Last Applicant/ Owned by
Marienstrasse 12
Berlin
DE
10117
Serial Number
98250068 filed on 01st Nov 2023
Registration Number
N/A
Filing Basis
1. intent to use
Disclaimer
NO DATA
Consulting in the field of software design; Consulting in the field of software as a service; Consulting services in the field of computers and software, including software usage, design, and architecture; expert advisory on software development methodologies, including agile, DevOps, and traditional approaches; consultation on designing and architecting software systems to meet specific business Read More
Consulting in the field of software design; Consulting in the field of software as a service; Consulting services in the field of computers and software, including software usage, design, and architecture; expert advisory on software development methodologies, including agile, DevOps, and traditional approaches; consultation on designing and architecting software systems to meet specific business needs, scalability, and performance requirements; strategic guidance on integrating software solutions with existing IT infrastructure and business processes; evaluation and optimization of software design for efficiency, maintainability, and security; consulting on best practices for secure software development, including threat modeling, secure coding, and vulnerability management; assistance with the selection, implementation, and customization of software applications to enhance operational efficiency; advisory services on software lifecycle management, including upgrades, migrations, and end-of-life planning; expert analysis and recommendations on emerging software technologies and trends to support innovation and competitive advantage; Consulting services in the field of computer networks with different software environments; Consulting services in the field of software in the field of e-commerce; Consulting services in the field of software for communication systems; Computer programming and software development; Consulting and advisory services in the field of computer hardware and software, including embedded devices and software security; expert guidance on the design, implementation, and optimization of hardware and software solutions with a focus on security; consulting on embedded system security, including secure firmware development, vulnerability management, and risk assessment; advisory services on identifying and managing vulnerabilities within hardware and software systems, including triage and remediation strategies; strategic planning for enhancing system security, including security assessments, threat modeling, and compliance with industry standards; support for integrating security best practices into software development lifecycle and hardware design; analysis of hardware-software interoperability, including security considerations for system integration and configuration; recommendations for upgrading and modernizing IT infrastructure and software systems to address emerging security threats and improve resilience; Design and development of software for retrieval of data; Computer software design; Design of software for embedded devices; Diagnosing computer hardware problems using software; conducting technical project studies in the field of new technologies of computer hardware and software; conducting project studies in the field of new technologies of software; Development and testing of software; Computer software development; Development of software for digital signal processing; Development of software for communication systems; Design, development and implementation of software; Creation of software; Provide technical advice in the field of software development; Troubleshooting IN THE NATURE OF DIAGNOSING computer hardware and software problems; SCIENTIFIC Research related to IN THE FIELD OF computer programs and software; IT project management; Design of digital signal processing software; Custom design of software packages; Software consulting; software design; Software engineering; Software development; Security software consulting services; Internet security COMPUTER programming; Computer programming services for electronic data security; Computer-related analysis services, including end-point protection, local and remote forensics, and incident management in the field of computer security. Computer systems analysis consulting services, providing expert guidance on evaluating, designing, and optimizing computer systems with a focus on performance, security, and compliance. Services include risk assessment, system architecture design, security analysis, incident response planning, and regulatory compliance. Consulting also covers vulnerability management, forensic analysis, and training for effective system management and security enhancement; Computer security threat analysis for data protection; Monitoring of computer systems to detect unauthorized access and data breaches; Monitoring of computer systems to detect failures;
N/A
N/A
Training in software systems development; Training in software systems design; Training services in the field of software, including secure design, security software, and secure programming; educational services providing instruction and hands-on training on best practices for secure software development, including threat modeling, secure coding techniques, and vulnerability management; training programs on the design and implementation of security features in software applications, systems, and networks; workshops and courses on using security software tools for threat detection, risk assessment, and incident response; educational seminars on compliance with security standards, regulations, and industry frameworks; professional development programs focused on advanced topics in cybersecurity, including secure software architecture, encryption methods, and secure application lifecycle management; certification programs for validating expertise in security software and secure programming practices; online and in-person training sessions for developers, IT professionals, and security experts on safeguarding applications and systems against cyber threats; Training in the field of the operation of software systems;
N/A
N/A
Downloadable software for use in the identification, mitigation, prevention, analysis, and management of cybersecurity threats and vulnerabilities; downloadable software for network security testing, penetration testing, vulnerability scanning, risk assessment, and security auditing; downloadable software for monitoring, detecting, and responding to cyberattacks, data breaches, and unauthorized access; downloadable software for encryption, data protection, secure communications, malware detection, and incident response; downloadable software for reporting, visualizing, and analyzing cybersecurity metrics and trends; Downloadable authentication software for identity management, access control, and authorization for users, machines, devices, and objects; downloadable software for managing digital identities, verifying credentials, and securing access to networks, systems, applications, and connected devices; downloadable software for authentication processes, including multi-factor authentication, single sign-on (SSO), and certificate-based authentication; downloadable software for enforcing access policies, managing permissions, and securing sensitive data; downloadable software for credential management, password protection, and encryption for both user and machine identities in physical, virtual, and cloud environments; Downloadable computer software for security testing, vulnerability scanning, penetration testing, and risk assessment of IT systems, networks, and applications; downloadable software for monitoring, detecting, and analyzing cybersecurity threats, vulnerabilities, and malicious activity; downloadable software for identifying and mitigating risks associated with unauthorized access, data breaches, malware, ransomware, and other cyberattacks; downloadable software for auditing, reporting, and ensuring compliance with security policies and regulations; downloadable software for security configuration management, patch management, and continuous security monitoring; downloadable software for simulating cyberattacks to assess system defenses and response capabilities; downloadable software for managing incident response, forensic analysis, and recovery after security breaches; Downloadable debugging software for quality assurance, information security research, and performance optimization of software applications, systems, and networks; downloadable software for detecting, analyzing, and resolving software bugs, vulnerabilities, and security flaws; downloadable software for identifying and mitigating security risks through real-time debugging and code analysis; downloadable software for security testing, vulnerability assessment, and penetration testing during the development and deployment of IT infrastructure; downloadable software for ensuring compliance with security standards, secure coding practices, and system integrity; downloadable software for conducting forensic analysis, incident investigation, and post-breach debugging to identify the source of cybersecurity incidents; Downloadable embedded software for providing peripheral drivers, functional logic, and secure communication protocols to microcontrollers in the field of embedded device security and research; downloadable software for securing embedded systems and firmware against unauthorized access, tampering, and malware; downloadable software for encryption, secure boot, and authentication processes in embedded devices; downloadable software for real-time monitoring, threat detection, and vulnerability analysis of embedded systems and Internet of Things (IoT) devices; downloadable software for conducting security testing, penetration testing, and risk assessments specific to firmware and hardware interfaces; downloadable software for managing secure updates, patch management, and lifecycle maintenance of embedded device firmware and software; downloadable software for auditing and ensuring compliance with embedded system security standards and regulations; Downloadable software for computer security, security hardening, and implementing security patches and enhancements across IT systems, networks, and applications; downloadable software for identifying, mitigating, and remediating vulnerabilities, security flaws, and misconfigurations; downloadable software for deploying security patches, updates, and enhancements to prevent unauthorized access, malware, ransomware, and other cyber threats; downloadable software for enhancing system defenses through configuration management, encryption, and access control; downloadable software for automated vulnerability assessments, patch management, and real-time monitoring of security postures; downloadable software for strengthening security protocols, improving system resilience, and ensuring compliance with industry security standards and regulations; downloadable software for providing security hardening recommendations, enforcing security policies, and tracking the implementation of security improvements; Downloadable software for general use in security, operation, and monitoring of computer systems, networks, and applications; downloadable software for enhancing system performance, managing system operations, and ensuring secure and efficient operation of software and hardware; Downloadable privacy protection software for analyzing, modifying, and enhancing the configuration and behavior of other software with regard to information security and privacy; downloadable software for assessing and improving the security and privacy practices of applications, systems, and data management processes; downloadable software for identifying and mitigating privacy vulnerabilities, ensuring compliance with data protection regulations, and enforcing privacy policies; downloadable software for securing sensitive information, managing user consent, and protecting personal data from unauthorized access and breaches; downloadable software for auditing software behavior, securing communication channels, and implementing encryption and anonymization techniques; downloadable software for providing insights into privacy risks, generating compliance reports, and offering recommendations for enhancing overall privacy and data protection measures; Downloadable hardware testing software for quality assurance, information security research, and analysis of electronic and embedded systems; downloadable software for evaluating hardware performance, reliability, and compliance with industry standards; downloadable software for conducting security assessments, vulnerability scanning, and penetration testing on hardware components and embedded systems; downloadable software for analyzing and detecting potential security weaknesses, unauthorized access points, and susceptibility to cyber threats; downloadable software for stress testing hardware under various operational conditions, ensuring secure data handling, and verifying the integrity of hardware-software interfaces; downloadable software for auditing hardware configurations, managing firmware updates, and implementing security patches; downloadable software for generating detailed reports on hardware security posture, quality metrics, and compliance with regulatory requirements; Downloadable data processing software for the collection, manipulation, analysis, and visualization of data from various sources; downloadable software for managing and transforming large datasets, performing statistical analysis, and generating actionable insights; downloadable software for data cleansing, validation, and enrichment to ensure accuracy and reliability; downloadable software for integrating data from multiple sources, supporting data migration, and facilitating data warehousing; downloadable software for automating data workflows, including data extraction, transformation, and loading (ETL) processes; downloadable software for implementing data security measures, including encryption, access controls, and compliance with data protection regulations; downloadable software for real-time data monitoring, reporting, and decision-making support; downloadable software for creating and managing databases, performing data backups, and ensuring data integrity; Downloadable risk identification software for detecting, assessing, and managing potential risks across various domains, including IT systems, business operations, and project management; downloadable software for identifying security vulnerabilities, compliance gaps, and operational risks within systems and processes; downloadable software for analyzing risk factors, evaluating impact and likelihood, and prioritizing risk mitigation strategies; downloadable software for conducting risk assessments, generating risk reports, and providing actionable insights for risk management; downloadable software for integrating with other risk management tools and frameworks to enhance overall risk visibility and control; downloadable software for monitoring risk indicators, tracking risk mitigation efforts, and updating risk profiles in real-time; downloadable software for supporting decision-making processes by offering risk modeling, scenario analysis, and forecasting capabilities; downloadable software for ensuring compliance with industry regulations and standards related to risk management and security;
N/A
N/A
No 98250068
No Service Mark
No 23-1066/0474
Yes
Yes
No
Yes
No
No
No
No
26.11.21 -
Rectangles that are completely or partially shaded
26.17.02 -
Wavy line(s), band(s) or bar(s)
26.17.05 -
Horizontal line(s), band(s) or bar(s)
Status Date | Action Taken |
---|---|
23rd Dec 2024 | FINAL REFUSAL WRITTEN |
23rd Dec 2024 | NOTIFICATION OF FINAL REFUSAL EMAILED |
23rd Dec 2024 | FINAL REFUSAL E-MAILED |
05th Dec 2024 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
05th Dec 2024 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
05th Dec 2024 | TEAS/EMAIL CORRESPONDENCE ENTERED |
10th Sep 2024 | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED |
10th Sep 2024 | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED |
11th Jun 2024 | NON-FINAL ACTION WRITTEN |
11th Jun 2024 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |