ENEO TECNOLOGIA, S.L. logo

ENEO TECNOLOGIA, S.L.

5 Marks
LLC
First Filed:Jun 18, 2015Latest Filed:Feb 6, 2023Address:Parque Tecnologico de Bizkaia, Derio, Bizkaia, 48160, ES

Portfolio Overview

Registered
5(100%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
5(100%)
Class 42
Software, IT Services & Scientific Research
4(80%)

TTAB Proceedings

No litigation activity

Top Firms

No firm data

Trademark Portfolio

5 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
HORAMA
HORAMA
Trademark
Word
REGISTERED
Owner:
Serial:97782136
Filed:Feb 6, 2023
Classes:9, 42
Registration:7320531
Registered:Mar 5, 2024
Goods & Services
(Based on 44(d) Priority Application) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software(Based on 44(e)) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software; (Based on 44(d) Priority Application) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks(Based on 44(e)) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks
REDBORDER
REDBORDER
Trademark
Word
REGISTERED
Owner:
Serial:97782125
Filed:Feb 6, 2023
Classes:9, 42
Registration:7320530
Registered:Mar 5, 2024
Goods & Services
(Based on 44(d) Priority Application) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software(Based on 44(e)) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software; (Based on 44(d) Priority Application) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks(Based on 44(e)) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks
REDBORDER
REDBORDER
Trademark
Combined
REGISTERED
Owner:
Serial:97782163
Filed:Feb 6, 2023
Classes:9
Registration:7320532
Registered:Mar 5, 2024
Goods & Services
(Based on 44(d) Priority Application) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software(Based on 44(e)) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software | (Based on 44(d) Priority Application) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks(Based on 44(e)) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks
HORAMA
HORAMA
Trademark
Stylized
REGISTERED
Owner:
Serial:86666350
Filed:Jun 18, 2015
Classes:9, 42
Registration:5015783
Registered:Aug 9, 2016
Goods & Services
[ Software and ] hardware for data analytics and cybersecurity; [ software and ] hardware for data visualization technology and report generation; [ software and ] hardware for anomaly detection in computer networks; [ software and ] hardware for massive data management; [ software and ] hardware for data enrichment and for data mining and correlation; [ software and ] hardware for computer networks monitoring; [ software and ] hardware for monitoring cellular networks and cellular telephony; [ software and ] hardware for computer and cybersecurity alert management; [ antimalware software systems, namely, computer software systems for preventing and defending against cyber attacks; computer registers management systems, namely, computer software systems for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for computer and cybersecurity alert management; software and ] hardware for antivirus; [ software and ] hardware for intrusion detection in computer networks; Design and development of software for manipulating, managing and analyzing large volumes of data; Design and development of software for computer security; Design and development of antivirus software; Software design and development to prevent and defend against cyber attacks; Installation and maintenance of software for manipulating, managing and analyzing large volumes of data; installation and maintenance of software for computer security; installation and maintenance of antivirus software; Providing on-line non-downloadable software for preventing and defending against cyber attacks
REDBORDER
REDBORDER
Trademark
Combined
REGISTERED
Owner:
Serial:86666383
Filed:Jun 18, 2015
Classes:9, 42
Registration:5015784
Registered:Aug 9, 2016
Goods & Services
[ Software and ] hardware for data analytics and cybersecurity; [ software and ] hardware for data visualization technology and report generation; [ software and ] hardware for anomaly detection in computer networks; [ software and ] hardware for massive data management; [ software and ] hardware for data enrichment and for data mining and correlation; [ software and ] hardware for computer networks monitoring; [ software and ] hardware for monitoring cellular networks and cellular telephony; [ software and ] hardware for computer and cybersecurity alert management; [ antimalware software systems, namely, computer software systems for preventing and defending against cyber attacks; computer registers management systems, namely, computer software systems for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for computer and cybersecurity alert management; software and ] hardware for antivirus; [ software and ] hardware for intrusion detection in computer networks | [ Design and development of software for manipulating, managing and analyzing large volumes of data; Design and development of software for computer security; Design and development of antivirus software; Software design and development to prevent and defend against cyber attacks; Installation and maintenance of software for manipulating, managing and analyzing large volumes of data; installation and maintenance of software for computer security; installation and maintenance of antivirus software; Providing on-line non-downloadable software for preventing and defending against cyber attacks ]

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.