tm logo
TSUNAMI BUOY
Live/Registered
REGISTERED

on 18 Feb 2020

Last Applicant/ Owned by

Elmbridge Court, Cheltenham Road East

Gloucester

GB

GL31JZ

Serial Number

88429666 filed on 14th May 2019

Registration Number

5988316 registered on 18th Feb 2020

in the Principal Register

Correspondent Address

Ashley K. Long

Ashley K. Long

701 5TH AVE, SUITE 3600

SEATTLE, WA 98104

Filing Basis

No Filing Basis

Disclaimer

NO DATA

TSUNAMI BUOY

Education services, namely, providing classes, lectures, seminars and workshops, in the fields of cyber security, cyber intelligence and cyber risk assessment; training services in the field of cyber security, cyber intelligence and cyber risk assessment; Publication of printed matter, namely, pamphlets, prospectuses, books, publications, periodicals, posters, printed forms, directives, guidelines Read More

Classification Information


Class [009]
Computer & Software Products & Electrical & Scientific Products


Downloadable computer hardware; Downloadable computer software for use in cyber security, cyber intelligence and cyber risk assessment; Downloadable computer security software; Downloadable computer software that combines security telemetry data received from control points within an enterprise's information technology environment and global cyber security threat data into a single unified platform; Computer hardware and downloadable software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; Downloadable computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer malware, cyber-attacks, malicious attacks, and advanced persistent threats; Downloadable computer software and hardware for digital security; Downloadable computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; Downloadable computer software applications for mobile telephones, smartphones, tablet computers, notebook computers, computers and media players, namely, for cyber security, cyber intelligence and cyber risk assessment; Downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable software applications that provides Internet users with information on data collection practices and the ability to view and block the tracking settings, web bugs, web trackers, widgets and advertising services associated with websites visited; downloadable software for use in accessing computer networks and global communications networks; downloadable security analytics software for monitoring network security and identifying threats and vulnerabilities; Downloadable electronic publications in the nature of books, bulletins, booklets, blogs, flyers, leaflets, journals, newsletters and pamphlets in the field of computer software, computer hardware and cyber security; downloadable computer software for use in Application Programming Interface

Class [016]
Paper Goods and Printed Material


Publications, namely, reports and articles in the field of computer software, computer hardware and cyber security

Class [035]
Advertising, Business & Retail Services


Business risk assessment services; Business consultancy relating to the administration of information technology; Computer file management; computer data entry services, namely, computerized updating of business data; Computerized file management; Data management services, namely, information and data compiling and analyzing relating to business management; Data processing services; Database management; Compilation of information into computer databases relating to information technology

Class [036]
Insurance & Financial Services


Insurance risk management and assessment services

Class [041]
Education and Entertainment Services


Education services, namely, providing classes, lectures, seminars and workshops, in the fields of cyber security, cyber intelligence and cyber risk assessment; training services in the field of cyber security, cyber intelligence and cyber risk assessment; Publication of printed matter, namely, pamphlets, prospectuses, books, publications, periodicals, posters, printed forms, directives, guidelines and fact sheets

Class [042]
Computer & Software Services & Scientific Services


Computer consultation services, namely, information technology security, protection and restoration; computer security consultation services, namely, cyber security services; technology advisory services relating to computer hardware and software; Application service provider (ASP), namely, hosting computer software applications of others; Application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; Application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; Cloud computing hosting services featuring software and databases for use in computer security and prevention and mitigation of computer risks; Information technology consulting services; Computer consultation and research in the field of computer hardware, computer software and network security; Computer security consultation; Computer consulting services in the field of analyzing security intelligence data to uncover threats and prioritize, prevent against future attacks, simplify management of security data; Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security consultation; Computer security services, namely, provision of firewalls; Computer programming services; Computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; Computer security consultancy; Computer security system monitoring services; technology services, namely, computer systems evaluation; Computer virus protection services; Computerized and technical data analysis services, in particular computerised technical data analysis, in particular for assessing causes of damage and damaging events; computer technology consulting services, namely, conducting of inspections, tests, certifications, authorisations and revisions, in particular for products, installations, devices, operations and businesses, technical or digital systems, monitoring systems, protection systems, safety devices; computer technology consulting services, namely, conducting of technical examinations, inspections and tests, in particular for products, installations, devices, operations and businesses, technical or digital systems, monitoring systems, protection systems, safety devices; Computer security consultancy; Computer programming consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; Consultancy services relating to information technology; electronic data storage of web pages for online services and the internet; Data security consultancy services; Design and development of computer hardware and software; Design of electronic data storage systems; Design, testing, technical consultancy and research relating to computer programming and computers; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Authentication, issuance and validation of digital certificates for products, installations, devices, operations and businesses, technical or digital systems, monitoring systems, protection systems, safety devices, security systems, documents, procedures or processes, professionals and experts or the like; Development, updating and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; Electronic document and email archiving services; Encryption and decryption of data and communications; Industrial analysis and research services in the field of computer systems; Providing information relating to information technology; Information technology consultancy and support services, namely, help desk services; Information technology security services in the nature of providing a website that features technology that enables the secure exchange of information by users to view cyber-threat intelligence, to cyber-attack verification, and to security analysis of network traffic, emails, files, media computer software, and mobile applications; Internet security services, namely, globally monitoring and collecting cyber security intelligence; Issuing of information relating to information technology; information technology security, protection, restoration and monitoring, namely, computer virus protection services; Maintenance of computer software; Monitoring of computer systems for security purposes for protecting data and information from unauthorized access; Monitoring of secure computer systems for protecting data and information from unauthorized access; Network and Internet security services for protecting data and information from unauthorized access; Planning, design and management of information technology systems and computer security consultancy; Preparation of technical reports and analyses in conjunction with computer system analysis; Professional computer security consultancy; Providing and creation of information systems and services, namely, planning, design and management of information technology systems; Providing information in the field of computer systems and online security services, via computer networks, wireless networks and the Internet; Providing information in the field of network and Internet security; Providing information in the fields of global computer network and electronic network security; Providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; Providing services in the field of unified security analytics, mainly, to measure, track and reduce cyber security risks, uncover targeted attack campaigns, investigate past or current attacks, and identify anomalous activity across computer networks; Providing technical information in the field of big data analytics; Providing technical information in the field of computer software applications; Development of data processing programs by order of third parties; Provision of information relating to information technology; Conversion of software and computer data; Remote or on-site monitoring of computer systems to ensure proper functioning; Research and consultancy relating to information technology security, protection and monitoring; computer technological consultation in the technology fields of providing security systems, documents, procedures or processes, professionals and experts; Security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analysing global computer information network and internal computer network vulnerability; consultancy services, namely, software implementation; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; computer technology consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; computer technology professional consultancy; Technical consultancy services relating to information technology; Information technology consultation in connection with data and information security, network security, computer security, information technology system security; Information technology consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; Technical support services, namely, troubleshooting of computer software problems; Updating and maintaining computer software for others; Updating of computer software; Web content categorization and filtering services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; hosting an internet portal in the fields of technology, cyber security and software development; software as a services, namely, Application Programming Interface software for integration of data content into websites

Mark Details


Serial Number

No 88429666

Mark Type

No Service Mark

Attorney Docket Number

No WYN003-0142

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
18th Feb 2020REGISTERED-PRINCIPAL REGISTER
03rd Dec 2019OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
03rd Dec 2019PUBLISHED FOR OPPOSITION
13th Nov 2019NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
31st Oct 2019ELECTRONIC RECORD REVIEW COMPLETE
25th Oct 2019ON HOLD - ELECTRONIC RECORD REVIEW REQUIRED
23rd Oct 2019ASSIGNED TO LIE
16th Oct 2019APPROVED FOR PUB - PRINCIPAL REGISTER
15th Oct 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
15th Oct 2019TEAS/EMAIL CORRESPONDENCE ENTERED