ENEO TECNOLOGIA, S.L.
5 Marks
LLC
First Filed:Jun 18, 2015Latest Filed:Feb 6, 2023Address:Parque Tecnologico de Bizkaia, Derio, Bizkaia, 48160, ES
Portfolio Overview
Registered
5(100%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchTTAB Proceedings
No litigation activity
Top Firms
No firm data
Trademark Portfolio
5 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
5
0
Status
5
0
0
0
0
Mark Type
2
1
0
2
0
5
4
Goods & Services
(Based on 44(d) Priority Application) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software(Based on 44(e)) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software; (Based on 44(d) Priority Application) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks(Based on 44(e)) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks
Goods & Services
(Based on 44(d) Priority Application) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software(Based on 44(e)) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software; (Based on 44(d) Priority Application) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks(Based on 44(e)) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks
Goods & Services
(Based on 44(d) Priority Application) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software(Based on 44(e)) Computer hardware and recorded software systems for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, antimalware software systems, for computer and cybersecurity alert management and for intrusion detection in computer networks, for computer records management systems; Computer hardware and peripherals; Computers and computer hardware; Downloadable computer software for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, antimalware software systems, and for computer and cybersecurity alert management and instructional user guides sold as a unit; Downloadable computer anti-virus software; Recorded computer anti-virus software | (Based on 44(d) Priority Application) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks(Based on 44(e)) Design and development of computer software for manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks; Installation and maintenance of manipulating, managing and analyzing large volumes of data, software for computer security, antivirus software, software to prevent and defend against cyber attacks software; Providing on-line non-downloadable software for preventing and defending against cyber attacks, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks
Goods & Services
[ Software and ] hardware for data analytics and cybersecurity; [ software and ] hardware for data visualization technology and report generation; [ software and ] hardware for anomaly detection in computer networks; [ software and ] hardware for massive data management; [ software and ] hardware for data enrichment and for data mining and correlation; [ software and ] hardware for computer networks monitoring; [ software and ] hardware for monitoring cellular networks and cellular telephony; [ software and ] hardware for computer and cybersecurity alert management; [ antimalware software systems, namely, computer software systems for preventing and defending against cyber attacks; computer registers management systems, namely, computer software systems for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for computer and cybersecurity alert management; software and ] hardware for antivirus; [ software and ] hardware for intrusion detection in computer networks; Design and development of software for manipulating, managing and analyzing large volumes of data; Design and development of software for computer security; Design and development of antivirus software; Software design and development to prevent and defend against cyber attacks; Installation and maintenance of software for manipulating, managing and analyzing large volumes of data; installation and maintenance of software for computer security; installation and maintenance of antivirus software; Providing on-line non-downloadable software for preventing and defending against cyber attacks
Goods & Services
[ Software and ] hardware for data analytics and cybersecurity; [ software and ] hardware for data visualization technology and report generation; [ software and ] hardware for anomaly detection in computer networks; [ software and ] hardware for massive data management; [ software and ] hardware for data enrichment and for data mining and correlation; [ software and ] hardware for computer networks monitoring; [ software and ] hardware for monitoring cellular networks and cellular telephony; [ software and ] hardware for computer and cybersecurity alert management; [ antimalware software systems, namely, computer software systems for preventing and defending against cyber attacks; computer registers management systems, namely, computer software systems for data analytics and cybersecurity, for data visualization technology and report generation, for anomaly detection in computer networks, for massive data management, for data enrichment and for data mining and correlation, for computer networks monitoring, for monitoring cellular networks and cellular telephony, for computer and cybersecurity alert management; software and ] hardware for antivirus; [ software and ] hardware for intrusion detection in computer networks | [ Design and development of software for manipulating, managing and analyzing large volumes of data; Design and development of software for computer security; Design and development of antivirus software; Software design and development to prevent and defend against cyber attacks; Installation and maintenance of software for manipulating, managing and analyzing large volumes of data; installation and maintenance of software for computer security; installation and maintenance of antivirus software; Providing on-line non-downloadable software for preventing and defending against cyber attacks ]