on 22 Aug 2024
Last Applicant/ Owned by
SCC UK Holdings Limited
James House, Warwick Road
Birmingham, , B11 2LE
Serial Number
UK00004090926 filed on 22nd Aug 2024
Registration Number
UK00004090926 registered on
31st Dec 1969
Correspondent Address
165-169 Scotland Street
Glasgow,
G5 8PL
Computer applications software; cloud based computer applications software; computer hardware for data, computer, network and internet security; computer software including computer applications software for data, computer, network and internet security; cloud-based software including cloud-based computer applications software for data, computer, network and internet security; computer software including computer application software for authenticating and verifying data; computer software including computer applications software for ensuring data privacy; anti-hacking computer software; data security computer applications; data security software; computer security software; network security software; network threat detection hardware and software; computer software for protecting data security; computer software for ensuring data transparency; data processing and management software; data protection software; version control software to record updates to data; computer hardware and software applications for checking, scanning and monitoring for vulnerabilities of data, apps, computer systems, computer software, networks and the internet; hardware and software applications for scanning, detecting and removal of malware, adware, spyware and other unwanted software; computer software including computer applications software for backing-up data including scheduling back-ups of data on to the network and the cloud; antiviral computer hardware and software; computer software for installing firewalls on computer systems, networks including telecommunications networks and on the internet; computer hardware and software for scanning, monitoring and analysing data traffic; computer software including computer applications software for monitoring, detecting, identifying, tracking, logging, analysing and reporting on threat and intrusion detection; computer software including computer applications software for monitoring, detecting, identifying, tracking, logging, analysing and reporting on threat and intrusion detection for cloud-based applications; computer network security software and hardware; network access management software; computer software for allowing users to access, check, query and quarantine data, information, applications, including cloud-based information and applications; computer software for creating, editing, uploading, downloading, storing, transferring, transmitting, receiving, recording, posting, displaying, reproducing, tagging, blogging, sharing, disseminating or otherwise providing data, files, graphics, text, voice, signals, images, sound, audio content, videos, messages, documents; computer software for creating, editing, uploading, downloading, storing, transferring, transmitting, receiving, recording, posting, displaying, reproducing, tagging, blogging, sharing, disseminating or otherwise providing data, files, graphics, text, voice, signals, images, sound, audio content, videos, messages, documents to multiple users, over a computer system, a computer network, the internet or by any other electronic means; computer software for monitoring, reporting on preventing attacks on data, data, applications, computers, electronic devices, computer systems and services; networks including telecommunication networks and the Internet; computer software for insider threat detection and prevention; computer software for protecting user accounts, networks and applications from threats, attack and viruses; computer software for reviewing, checking, monitoring, analysing and generating reports of computer event logs; computer software for monitoring computer network access and activity; computer software for blocking remedying security threats in real-time or otherwise; computer software including computer applications software for identifying unauthorised, malicious or unexpected activity on user accounts, computer applications and services including cloud-based applications; computer software including computer applications software that uses machine learning for threat and anomaly detection; computer software including computer applications software to proactively identify, alert and remedy malicious or unauthorised activity; computer software that generates reports on potential and actual unauthorised, malicious, or unexpected activity; computer software for accessing, browsing and sharing information about cloud-based applications; computer software for accessing, browsing and sharing information about computer applications; computer software to enable customers and/or users to view, access and manage and maintain their applications; computer software to enable customers and/or users to view, access, manage and maintain their cloud-based applications; computer software for installing, configuring and running web applications; computer applications software for installing, configuring and running data security and cyber security applications; data capture and management software; software for monitoring and reporting on the performance of computer applications; software for monitoring and reporting the performance of cloud-based computer applications; database monitoring and management software; computer software for multi-cloud monitoring; computer software for testing, monitoring and troubleshooting applications performance on cloud and virtualisation platforms including detecting and troubleshooting service outages, application lags, server downtime and other bottlenecks; computer software for application service mapping for monitoring and troubleshooting; knowledge management software; network and interface management software; computer software for managing data feeds from different apps; computer software for managing data feeds from different cloud based apps; computer software for managing data feeds from different apps through a single interface; computer software for managing data feeds from various data feeds from different cloud based apps through multiple or a single interface; computer software for the design, development, deployment, security, maintenance and retirement of apps; communications software for managing data and communications between databases and multiple networks; parts and fittings for all of the aforesaid goods.
Installation and maintenance of computer hardware; installation of computer hardware, software and firmware for data, computer network and internet security software; Installation and maintenance of hardware for scanning, detecting and removal of malware, adware, spyware and other unwanted software; installation and maintenance of antiviral computer hardware; installation and maintenance of firewalls; professional consultancy services in connection with safeguarding data, computer, computer systems, communication and networks resulting from installation of computer hardware and software;Â information, advisory and consultancy services for all of the aforesaid services.
Internet portal services; client portal services; web portal services; communications services; email, SMS and text services; transmission of data, text, voice, images via a communications network; managing communications between different networks; managing communications between multi-cloud networks; managing communications from different data feeds from different applications; managing communications from different data feeds from different cloud based applications; managing communications between different networks, multiple cloud-based networks and between multiple applications on different cloud and virtualisation platforms; communicating data, trends, statistics between different networks, multiple cloud-based networks and between multiple applications on different cloud and virtualisation platforms; providing access to hosted operating systems and computer applications through the Internet; providing access to databases; providing multiple-user access to data on the Internet in the fields of computer network security, security monitoring, threat detection and remediation; providing temporary access to remote computers for the purpose of running software programs; professional consultancy services for monitoring and safeguarding communications from viruses, threats and breaches; professional consultancy services for developing strategies for safeguarding communications from viruses, threats and breaches; information, advisory and consultancy services for all of the aforesaid services.
Computer programming and consultancy including research and development in the field of data, computer, computer systems, communications, network and Internet security; research, development and consultancy in the field of computer security and network security; computer programming, research, development and consultancy in the field of data, computer, computer systems, communications, network and Internet security; software as a service ( SaaS ) featuring software for reviewing, testing, monitoring and managing apps; software as a service ( SaaS ) featuring software for maintaining, reviewing, testing, monitoring and managing cloud based apps; software as a service ( SaaS ) featuring software for monitoring, detecting, identifying, tracking, logging, analysing and reporting on security, threats and intrusion detection in data, computer, computer systems, communications, network and on the internet; software as a service ( SaaS ) featuring software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services; software as a service ( SaaS ) featuring software for allowing users to access, query, analyse and quarantine cloud-based information and applications; software as a service ( SaaS ) services featuring software in the fields of data, computer, computer systems, communications systems, network and the Internet security, security monitoring and threat detection; software as a service ( SaaS ) featuring software in the fields of remedy of data, computer, computer systems, communications systems and network breaches; software as a service ( SaaS ) services in the fields of remedy of data, computer, computer systems, communications systems and network breaches; application service provider ( ASP ) services featuring software for data, computer, computer systems, communications, network and Internet security; platform as a service ( PaaS ) featuring software for data, computer, computer systems, network, communications and Internet security, security monitoring, threat and intrusion detection, and remediation; software as a service [ SaaS ] featuring software for the collection, editing, organising, modifying, transmission, storage and sharing of data and information; software as a service ( SaaS ) featuring software for data protection; software as a service ( SaaS ) featuring software for preventing attacks on networks, data, applications and services; software as a service ( SaaS ) featuring software for insider threat detection and prevention; software as a service ( SaaS ) featuring software for protecting user accounts, networks and applications from compromise; software as a service ( SaaS ) featuring software for reading and analysing computer event logs; software as a service ( SaaS ) featuring software for monitoring computer network access and activity; software as a service ( SaaS ) featuring software for automated blocking of security threats; software as a service ( SaaS ) featuring software for identifying unauthorised, malicious or unexpected activity that present threats to user accounts, applications and services in cloud-based applications; software as a service ( SaaS ) featuring software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remedy malicious or unauthorised activity; software as a service ( SaaS ) featuring software for providing access to a single interface to enable customers to view, use, manage, review, monitor, test, analyse, share, upgrade, install, collaborate on, troubleshoot, diagnose, renew and pay for apps including cloud-based apps; software as a service ( SaaS ) featuring software for use as an application programming interface ( API ) ; workflow management ( SaaS ) ; database monitoring and management ( SaaS ) ; software as a service ( SaaS ) featuring software for multi-cloud monitoring; software as a service ( SaaS ) featuring software for testing, monitoring and troubleshooting applications performance on cloud and virtualisation platforms including detecting and troubleshooting service outages, application lags, server downtime and other bottlenecks; software as a service ( SaaS ) featuring software for application service mapping for monitoring and troubleshooting; software as a service [ SaaS ] featuring software for network and interface management; software as a service ( SaaS ) featuring software for managing data feeds from different apps; software as a service ( SaaS ) featuring software for managing data feeds from different cloud-based apps; software as a service ( SaaS ) featuring computer software for managing data feeds from different apps through a single interface; software as a service [ SaaS ] featuring software for managing different data feeds from various data feeds from different cloud-based apps through a single interface; design, development, deployment, security, maintenance and retirement of apps; software as a service ( SaaS ) featuring software for managing, installing, deployment, configuring, running, testing, upgrading, monitoring, analysing, maintaining, reviewing, security and retirement of apps via user customised profiles; software as a service ( SaaS ) featuring software for managing, installing, deployment, configuring, running, testing, upgrading, monitoring, analysing, maintaining, reviewing, security and retirement of apps via user customised profiles over multiple networks including multiple cloud based networks; software as a service ( SaaS ) featuring software for managing, installing, deployment, configuring, running, testing, upgrading, monitoring, analysing, maintaining, reviewing, security and retirement of apps via user customised profiles over multiple networks including multiple cloud-based networks though a single interface; technical and consultancy services relating to data and cyber/network security; design, development and professional IT services in connection with data, computer, computer system, network, communication and the Internet; Professional consultancy and IT services relating to the data, network and cybersecurity; professional consultancy and IT services in designing and developing security system, and protocols for computer, communications and network systems; professional IT and consultancy services in connection with data security in cloud -based applications; computer programming in the field of blocking, foxing and remedying security breaches; computer programming services in connection with developing data, computer, computer systems, communications, network and internet security systems and strategies; design, development and consultancy in the field of data security and data remedy and recovery systems and strategies; information, advisory and consultancy services for all of the aforesaid services; installation and maintenance of computer software including computer applications software for data, computer, network and internet security; installation and maintenance of cloud-based software including cloud-based computer applications software for data, computer, network and internet security; installation and maintenance of computer software including computer application software for authenticating and verifying data; installation and maintenance of computer software including computer applications software for ensuring data privacy; installation and maintenance of anti-hacking software; installation and maintenance of data security computer applications; installation and maintenance of data security software; installation and maintenance of computer security software and network security software; installation and maintenance of anti-virus and anti-hacking patches; installation and maintenance of computer software including computer applications software for backing-up data including scheduling back-ups of data on to the network and the cloud; installation and maintenance of software patches; installation and maintenance of software patches for remedying threats and data and/or network breaches; professional consultancy in connection with implementing strategies and protocols for safeguarding against viruses or other threats and breaches arising from installation of software, including installation of software updates and installation of software patches; installation of computer software; installation and maintenance of software for scanning, detecting and removal of malware, adware, spyware and other unwanted software; installation and maintenance of antiviral computer software.
UK00004090926
Word
Individual