tm logo
SEQIFY
ADVERTISED

on 30 Oct 2024

Last Applicant/ Owned by

ING. ELMAR JILKA

Steiningerweg 4A-4040 Lichtenberg

AT

Serial Number

2179072 filed on 24th Nov 2021

Correspondent Address

SUITE 18002 BLOOR STREET EASTTORONTO

ONTARIO

CA

M4W3J5

SEQIFY

Trademark usage description

computer software, namely, software for ensuring the security of electronic mail, data backup software; downloadable computer antivirus software; down Read More

Classification Information


Class [009]
Computer software, namely, software for ensuring the security of electronic mail, data backup software; downloadable computer antivirus software; downloadable computer software for use in sending and receiving online messages; downloadable computer software for use in accessing the internet; downloadable computer software for use in sending and receiving email and instant messaging; downloadable computer software for the creation of firewalls for mobile devices; downloadable data compression software; downloadable data backup software; downloadable cloud network monitoring software; downloadable electronic mail and messaging software; downloadable computer software for network vulnerability analysis and the creation of network vulnerability reports in the field of cybersecurity; downloadable computer software for the permanent monitoring of computers, computer systems and mobile devices to minimize the risks of cyber attacks; downloadable computer software and software platforms for detecting and responding to cyber threats and cyber attacks; downloadable computer software and software platforms for the security and protection of PCs, laptops, mobile devices, servers, cloud, network and internet use; downloadable computer software for securing terminals, servers, data networks and internet usage; antivirus software; assistive software, namely, downloadable computer software used to process voice commands and create audio responses to voice commands; adaptive software, namely, computer software for communication between computer programs, namely, computer software that translates computer coding so that computer programs with different coding can communicate; downloadable computer software for testing embedded operating software; downloadable integrated suite of computer software for computer-aided design (CAD); downloadable computer groupware for use in database management; downloadable computer telephony software for use in operating internet telephony services; recorded computer software for use in database management; downloadable computer software applications for use in storing audio and video files and emails on mobile phones and tablet computers; downloadable computer software for image processing used in mobile phones; downloadable computer software applications for use in storing audio and video files and emails on tablet computers; downloadable business technology software, namely, computer security software for network vulnerability assessment; software for online messaging; internet access software; downloadable email software; instant messaging software; downloadable unified communications software to facilitate electronic communication, namely, video calls and text messages between individuals via the Internet; firewall software, in particular for mobile devices; downloadable computer software for computer technical support services, namely, troubleshooting and diagnosing computer hardware and software problems; downloadable computer software and application software for electronic mail security in hand-held digital electronic devices, namely, mobile phones and tablet computers; software for ensuring the security of electronic mail; data compression software; data backup software; downloadable cloud computing software for managing computer images on a cloud computing platform; software for the analysis of business data in the field of cyber risk management; downloadable software for mobile phone and tablet computer management; cloud network monitoring software; computer programs and software for image processing used for mobile phones; downloadable computer application software for mobile phones for use in database management; electronic mail and messaging software; downloadable augmented reality software for use in mobile phones and electronic tablets for integrating electronic data with real world environments; middleware for management of software functions on electronic devices, namely, middleware for management of communications between an email server and a mobile terminal, in particular, a mobile phone and an electronic tablet; downloadable software for searching and retrieving business data information in the field of cyber risk management across a computer network; downloadable electronic device software drivers that allow computer hardware and electronic devices to communicate with each other; graphical user interface software; downloadable computer software for analyzing the degree of digitization within a company's business processes for the purposes of improving business operations and general efficiency; downloadable computer software for comparing a company's business process data between mobile devices, namely, mobile phones and electronic tablets; downloadable computer software for comparing a company's business process data between a central computer and mobile devices, namely, mobile phones and electronic tablets; software for vulnerability analysis and the creation of vulnerability reports with regard to cybersecurity, in particular of network vulnerabilities; software for the permanent monitoring of computers, computer systems and mobile devices to minimize the risks of cyber attacks; software and software platforms for detecting and responding to cyber threats and cyber attacks; software and software platforms for the security and protection of pc, laptop, mobile device, server, cloud, network and internet use; downloadable computer security software and software platforms in the fields of data protection, antivirus protection, theft protection, backup, secure messaging, email security, secure browsing, software updates and management of remote-controlled devices, namely, video cameras, computer monitors and door locks; software solutions for securing terminals, servers, data networks and internet usage; downloadable software for providing access to cloud computing services; computer network threat detection software; network protection software, data leakage prevention; downloadable computer software for scanning, monitoring and analyzing software applications, computer systems and networks for the detection of cyber risks; downloadable cloud computing software for providing access to the Internet


Classification kind code

11

Class [041]
Provision of instruction relating to computer programming; training in the operation of software systems; training in enterprise mobility management (emm software)


Classification kind code

11

Class [042]
Development, programming, implementation, maintenance and updating of software; development of software for communication systems; design and development of software in the field of mobile applications; development of software for converting data from different protocols and into different protocols; computer software design; design of software for embedded devices; software creation; software engineering; software creation; software customisation services; installation of computer software; computer software consultancy; rental of computer software; software engineering services for data processing programs; updating of software databases; rental of computer software; custom design of software packages; computer software technical support services; rental of software for internet access; maintenance of software for computer records; configuration of computer networks by software; maintenance of software for communication systems; updating of software for communication systems; consultancy relating to software for communication systems; software as a service [SaaS] featuring software for use in computer help desk services; implementation of software; computer security consulting and computer network security consulting; monitoring services for computer security systems, in particular computer security services for protection against illegal network access; updating of software for embedded devices, in particular devices embedded in mobile devices; installation of internet access software; installation and maintenance of internet access software; consultancy in relation to software, in particular in relation to software for securing terminals, servers, data networks and the use of the internet; maintenance and updating of software for communication systems; installation, repair and maintenance of computer software; installation, maintenance and repair of software for computer systems; consultancy services relating to computer networks using mixed software environments; consultancy and advice in the field of computer software; design of software for data and multimedia content conversion from and to different protocols; providing temporary use of non-downloadable software to enable sharing of multimedia content, namely, video, audio, images and comments among users through instant messaging and text messages; IT services, namely managed cyber security services; IT services, namely endpoint security management; creation of vulnerability analyzes and of vulnerability reports and security gap reports with regard to cyber security; removal of weaknesses and security gaps in computers, computer systems and mobile devices to minimize the risks of cyber attacks; permanent monitoring of computers, computer systems and mobile devices to minimize the risk of cyber attacks; creation of an alert message in the event of a cyber attack; IT services, namely provision of endpoint detection and response (EDR) services; information technology asset management (ITAM) services for managing a company's software and hardware assets; carrying out discovery scans to create a list of software and hardware assets in a network, in particular finding outdated software, systems that are not system compliant, misconfigurations, open ports, malware and phishing software, shadow IT, from unsafe partner companies; execution of assessment scans to find weak points in software and hardware assets; updating of computer software relating to computer security and prevention of computer risks; application service provider [asp], namely, hosting computer software applications of others; support and maintenance services for security software; information security services for computer networks; scanning services to identify information security vulnerabilities; monitoring and assessing the information security risks of computer networks and websites; computer security services for protection against illegal network access; implementing and updating software solutions and IT services in the field of cybersecurity, including scanning and managing network vulnerabilities, detecting and reacting to cyber threats and attacks; IT services in the field of cybersecurity, including security and protection for pc, laptop, mobile devices, servers, cloud, network and internet use, data security and protection, antivirus protection, theft protection, backup, secure messaging, email security, safe browsing, software updates and management of remote-controlled devices; personal data protection (IT service); data compression and data loss prevention; public cloud hosting provider service; cloud hosting provider services; application service provider (ASP) services featuring application programming interface (API) software for analyzing market data and for gathering market data for image and text editing; private cloud hosting provider service; outsource service providers in the field of information technology consultancy relating to the installation, maintenance and repair of computer hardware


Classification kind code

11

Mark Details


Serial Number

2179072

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 22
on 01st Aug 2023
Search Recorded
Submitted for opposition 20
on 01st Aug 2023
Examiner's First Report
Submitted for opposition 223
on 01st Aug 2023
Total Provisional Refusal
Submitted for opposition 256
on 14th Feb 2023
Notification of Possible Opposition Sent
Submitted for opposition 48
on 15th Jun 2022
Agent Changed
Submitted for opposition 257
on 14th Apr 2022
Designation Notification - Madrid Protocol
Submitted for opposition 1
on 13th Apr 2022
Created
Submitted for opposition 31
on 13th Apr 2022
Formalized
Submitted for opposition 30
on 24th Nov 2021
Filed
Submitted for opposition 228
on 24th Nov 2021
International Registration