Penten Pty Ltd logo

Penten Pty Ltd

6 Marks
Proprietary Limite…
First Filed:Apr 9, 2021Latest Filed:Feb 26, 2025Address:Level 1, 216 Northbourne Avenue, Braddon, ACT, 2612, AU

Portfolio Overview

Registered
4(67%)
Pending
2(33%)

Top Classes

Class 42
Software, IT Services & Scientific Research
5(83%)
Class 9
Electronics, Software & Scientific Equipment
3(50%)
Class 45
Personal services
2(33%)

TTAB Proceedings

Total Proceedings
2
As Plaintiff
0(0%)
As Defendant
2(100%)

Top Firms

Nutter, McClennen & Fish, LL...(Feb 2025)
6

Trademark Portfolio

6 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
PENTENAMIO
PENTENAMIO
Trademark
Word
ITU
PENDING
Owner:
Serial:99057406
Filed:Feb 26, 2025
Classes:9, 38, 42, +1
Goods & Services
Cryptographic apparatus; scientific apparatus and instruments; security devices for mobile phones; security devices for electronic tablets; security devices for electronic devices; covers and protective cases for portable electronic devices; mobile phone peripheral devices and electronic tablet peripheral devices; Telecommunications security; Monitoring of security systems; Cryptanalysis services; Cryptographic engineering; Data cryptology services; Digital signature verification services (electronic cryptology services); Electronic signature verification services (electronic cryptology services); Computer security engineering; Data security services (firewalls); Network security services (test and risk assessment of electronic networks); Research relating to security; Security assessment services for computer networks; Providing secure mobility, cyber defense, security engineering, cryptology, electronic warfare, data science and digital security services.
TRAPRADIO
TRAPRADIO
Trademark
Word
ITU
PENDING
Owner:
Serial:98893787
Filed:Dec 10, 2024
Classes:9, 45
Goods & Services
apparatus for collecting by radio frequency radio waves; mobile radio transmitting apparatus for transmitting decoy waves; electronic apparatus for data processing of radio waves; electronic data processing devices for receiving and creating decoy radio waves; electronic identification apparatus for identifying third-party radio signals; security apparatus for processing video and/or audio signals and produce decoy video and/or audio signals; security surveillance apparatus for identifying third-party radio; computer networks for the processing of data using AI for receiving third-party radio signals; diagnostic viewing transceivers for evaluating local area network apparatus used by third-party video and/or audio signals; data feeders for use with artificial intelligence [in producing decoy video and/or audio signals; electronic surveillance; security surveillance; monitoring of security systems
HONEYTRACE
HONEYTRACE
Service Mark
Word
REGISTERED
Owner:
Serial:97029136
Filed:Sep 15, 2021
Classes:42
Registration:6868024
Registered:Oct 4, 2022
Goods & Services
Computer security services, namely, providing token files stored on networks for scanning and detection by search bots as a part of threat analysis for protecting data; Electronic storage of data; providing temporary use of on-line non-downloadable software and applications using artificial intelligence for generating fictional documents, data base records, email accounts, strings of data and web links for use as token files stored on networks for scanning and detection by search bots as a part of threat analysis for protecting data; providing temporary use of online non-downloadable software for creating fictional documents, database records, email accounts, strings of data and web links
HONEYTRACE
HONEYTRACE
Service Mark
Combined
REGISTERED
Owner:
Serial:97029355
Filed:Sep 15, 2021
Classes:42
Registration:6868025
Registered:Oct 4, 2022
Goods & Services
Computer security services, namely, providing token files stored on networks for scanning and detection by search bots as a part of threat analysis for protecting data; electronic storage of data; providing temporary use of on-line non-downloadable software and applications using artificial intelligence for generating fictional documents, data base records, email accounts, strings of data and web links for use as token files stored on networks for scanning and detection by search bots as a part of threat analysis for protecting data; providing temporary use of online non-downloadable software for creating fictional documents, database records, email accounts, strings of data and web links
HONEYTRACE
HONEYTRACE
Service Mark
Word
REGISTERED
Owner:
Serial:90635806
Filed:Apr 9, 2021
Classes:42
Registration:6873847
Registered:Oct 11, 2022
Goods & Services
providing temporary use of online non-downloadable software for monitoring network security and for providing network security information; providing temporary use of online non-downloadable software for computer hardware modules for detecting hacker attacks, tracking hacker attacks, for detecting vulnerabilities of data processing systems; providing temporary use of online non-downloadable software for providing search bots for scanning the Internet for unique tokens for identifying breached computer networks, web servers, enterprise systems, electronic components, computer peripherals and proprietary data; providing temporary use of online non-downloadable software for creating alerts based on interaction with proprietary files and information; providing temporary use of online non-downloadable software for generating fake documents, fictional database records and tables, web links, e-mail accounts and strings of data
HONEYTRACE
HONEYTRACE
Trademark
Word
REGISTERED
Owner:
Serial:90635946
Filed:Apr 9, 2021
Classes:9, 35, 37, +1
Registration:8023736
Registered:Nov 11, 2025
Goods & Services
Downloadable computer security software applications; downloadable computer software for detecting and reporting computer network intrusions, and computer network security management; downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable computer software for detecting fraudulent transactions and activities; downloadable computer software for investigating and responding to fraud and to network and enterprise threat incidents; downloadable computer software for use in analyzing and monitoring computer networks; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; Technical consulting related to the customization, installation and maintenance, of cybersecurity systems in the nature of networking hardware for others; Consultancy and research relating to the installation, maintenance and repair of computer hardware; Data processing services; Providing temporary use of non-downloadable computer security software applications; Providing temporary use of non-downloadable computer software for detecting and reporting computer network intrusions, and computer network security management; Providing temporary use of non-downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; Providing temporary use of non-downloadable computer software for detecting fraudulent transactions and activities; Providing temporary use of non-downloadable computer software for investigating and responding to fraud and to network and enterprise threat incidents; Providing temporary use of non-downloadable computer software for use in analyzing and monitoring computer networks; Providing temporary use of non-downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; Technology consultation in the field of artificial intelligence; Implementation of computer software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of online non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of online non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of online non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of online non-downloadable software and applications for use in analysing and monitoring computer networks; providing temporary use of online non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; provision of information in the field of computer and internet security risk; consultation in the field of computer and internet security risks; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating and managing of computer cyber-security systems in the nature of software for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security, and preventing and mitigating computer risks; updating and maintaining computer security software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of the design and development of computer hardware, computer security software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of computer security analysis of network traffic, emails, files, media computer software, and mobile applications to assess information security vulnerability; information technology security services in the nature of detecting cyberattacks through the providing of authentication, issuance, validation and revocation of digital certificates

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.