VOTIRO CYBERSEC LTD logo

VOTIRO CYBERSEC LTD

3 Marks
Pvt. Ltd.
First Filed:Jan 22, 2020Latest Filed:Apr 18, 2023Address:126 YIGAL ALON STREET, TEL AVIV, 67443, IL

Portfolio Overview

Registered
1(33%)
Pending
2(67%)

Top Classes

Class 42
Software, IT Services & Scientific Research
3(100%)
Class 9
Electronics, Software & Scientific Equipment
2(67%)

TTAB Proceedings

No litigation activity

Top Firms

LEVINE BAGADE HAN LLP(Apr 2023)
3

Trademark Portfolio

3 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
VOTIRO
VOTIRO
Trademark
Combined
ITU
PENDING
Owner:
Serial:97893567
Filed:Apr 18, 2023
Classes:9, 42
Goods & Services
Downloadable computer software platforms for encrypting electronic mail and data; Downloadable computer operating system software; Recorded computer operating system software; Recorded computer software for use in network management; Downloadable LAN (local area network) operating software; Electronic data encryption units; Downloadable computer software for use in sending and receiving data; Downloadable computer software for use in data processing; Downloadable electronic data files featuring code for encrypting email; Downloadable software for ensuring the security of electronic mail; Providing on-line non-downloadable software for use in database management and encrypting electronic mail and data; Data encryption services; Software as a service (SAAS) services, namely, hosting software for use by others for use in database management and encrypting electronic mail; Software as a service (SAAS) services featuring software for use in database management and encrypting electronic mail and data; Computer security consultancy; Computer security services, namely, design and development of secure computer hardware, software and systems for data management and encryption of electronic mail and data; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Security risk assessment services relating to computer systems; Electronic signature verification services using technology to authenticate user identity; data security consultancy; computer security consultancy in the field of scanning and penetration testing of computer networks to assess information security vulnerability; Computer software consultancy; Computer software engineering; Computer software development; Providing information about design and development of computer hardware and software; Software as a service (SaaS) services featuring software for use in database management and encrypting electronic mail and data; Software engineering; Application service provider (ASP), namely, hosting computer software applications of others; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Installation, repair and maintenance of middleware software; Installation of middleware software; Computer software development; Installation and maintenance of computer software; Computer virus protection services; Information technology services, namely, computer hardware, software and peripherals design and computer technology consultancy; Data security consultancy; Software as a service (SAS) featuring software for use in generating replicas of electronic documents that are safe from malware and unauthorized alteration; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Computer security services in the nature of administering digital keys; computer security threat analysis for protecting data; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer services, namely, filtering of unwanted e-mails; Electronic document and e-mail authentication services not for identification verification; Design and development of electronic data security systems the downloadable electronic data files
VOTIRO
VOTIRO
Trademark
Word
ITU
PENDING
Owner:
Serial:97854112
Filed:Mar 23, 2023
Classes:9, 42
Goods & Services
Downloadable computer software platforms for encrypting electronic mail and data; Downloadable computer operating system software; Recorded computer operating system software; Recorded computer software for use in network management; Downloadable LAN (local area network) operating software; Electronic data encryption units; Downloadable computer software for use in sending and receiving data; Downloadable computer software for use in data processing; Downloadable electronic data files featuring code for encrypting email; Downloadable software for ensuring the security of electronic mail; Providing on-line non-downloadable software for use in database management and encrypting electronic mail and data; Data encryption services; Software as a service (SAAS) services, namely, hosting software for use by others for use in database management and encrypting electronic mail; Software as a service (SAAS) services featuring software for use in database management and encrypting electronic mail and data; Computer security consultancy; Computer security services, namely, design and development of secure computer hardware, software and systems for data management and encryption of electronic mail and data; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Security risk assessment services relating to computer systems; Electronic signature verification services using technology to authenticate user identity; data security consultancy; computer security consultancy in the field of scanning and penetration testing of computer networks to assess information security vulnerability; Computer software consultancy; Computer software engineering; Computer software development; Providing information about design and development of computer hardware and software; Software as a service (SaaS) services featuring software for use in database management and encrypting electronic mail and data; Software engineering; Application service provider (ASP), namely, hosting computer software applications of others; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Installation, repair and maintenance of middleware software; Installation of middleware software; Computer software development; Installation and maintenance of computer software; Computer virus protection services; Information technology services, namely, computer hardware, software and peripherals design and computer technology consultancy; Data security consultancy; Software as a service (SAS) featuring software for use in generating replicas of electronic documents that are safe from malware and unauthorized alteration; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Computer security services in the nature of administering digital keys; computer security threat analysis for protecting data; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer services, namely, filtering of unwanted e-mails; Electronic document and e-mail authentication services not for identification verification; Design and development of electronic data security systems the downloadable electronic data files
POSITIVE SELECTION
POSITIVE SELECTION
Service Mark
Word
REGISTERED
Owner:
Serial:88768561
Filed:Jan 22, 2020
Classes:42
Registration:6196958
Registered:Nov 10, 2020
Goods & Services
Software as a service (SAS) featuring software for use in generating replicas of electronic documents that are safe from malware and other unauthorized data and programs

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.