WITHSECURE CORPORATION
7 Marks
Corp.
First Filed:Jun 8, 1999Latest Filed:Mar 7, 2023Address:Välimerenkatu 1, Helsinki, 00180, FI
Portfolio Overview
Registered
7(100%)Previous
2Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 38
TelecommunicationsClass 42
Software, IT Services & Scientific ResearchTTAB Proceedings
No litigation activity
Top Firms
K&L Gates LLP(Mar 2023)
9
Trademark Portfolio
9 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
7
2
Status
9
0
0
0
0
Mark Type
6
1
2
0
0
9
4
7
4
7
Owner:
Serial:79371223
Filed:Mar 7, 2023
Classes:9, 35, 38, +3
Registration:7909864
Registered:Aug 26, 2025
Goods & Services
Educational services, namely, conducting seminars, conferences and workshops in the field of cyber security; providing of training in the field of cyber security; arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable, namely, manuals featuring information technology in the field of cyber security; Downloadable software and applications for cyber security purposes; downloadable software platforms for cyber security purposes; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and internet use security and protection; downloadable software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; downloadable software for use of virtual private networks (VPN); downloadable software and applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; cloud computer network servers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB flash drives in the nature of pre-recorded USB flash drives featuring a platform for cyber security purposes; downloadable USB operating software; downloadable software and software device drivers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; Telecommunication services, namely, delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data, namely, images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; information, advisory and consultancy services relating to all the aforementioned services; Business management consulting services in the field of information technology; data processing, systematization into computer databases and database management; collection of data, namely, electronic data collection for business purposes in the field of information technology; computerised data processing; management and compilation of computerised databases; information, advisory and consultancy services relating to all the aforesaid services; Licensing of technology, namely, licensing of intellectual property in the field of patents and copyrights; licensing services, namely, licensing of software; providing information, advisory and consultation services in the field of data theft and identity theft in the field of cyber security; providing information and consultation relating to security for the protection of property and individuals; Scientific and technological services, namely, research and design in the field of cyber security; industrial analysis, industrial research and industrial design services in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks; development of new technology and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; consultancy in the field of cyber security, Internet security, computer security, computer network security and data security; research, design, development, implementation, maintenance and updating of software application solutions and IT security software in the field of cyber security and information security, including for scanning, monitoring, analyzing and managing software applications, computer systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security software in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security software in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing temporary use of online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; computer security services for protection against illegal network access; data compression services; electronic monitoring services for computer security services for prevention of data leakage; IT services in the field of cyber security, namely, data security consultancy; IT consultancy, advisory and information services, as it relates to the field of cyber security; IT security services in the nature of protection and recovery of computer data; providing temporary use of online, non-downloadable cyber security software for networks, end points, computer access and computerised transactions; computer virus protection services; computer data recovery services, namely, information technology restoration services in the field of data and applications; end point cyber security services, in the nature of restricting unauthorized access to computer systems; outsource service providers in the field of information technology relating to installation, maintenance, and repair of computer software; technical support services relating to computer software and applications, namely, troubleshooting of security software problems; monitoring of network and computer systems, for security software problems for quality control purposes; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes for security software problems for quality control purposes; providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; software as a service [SaaS] services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a service [PaaS] featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; infrastructure as a service [IaaS] featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; application service provider [ASP] services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services; cloud computing services, namely, cloud computing featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; administration of cloud servers, namely technical administration of services for others; cloud-based data protection services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; quality control for others and authentication services in the field of cyber security; electronic monitoring of information to detect online frauds and identity thefts; providing temporary use of online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services
Owner:
Serial:79360106
Filed:Jun 3, 2022
Classes:9, 35, 38, +3
Registration:7312510
Registered:Feb 27, 2024
Goods & Services
Educational services, namely, conducting seminars, conferences and workshops in the field of cyber security; providing of training in the field of cyber security; arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable, namely, manuals featuring information technology in the field of cyber security; Downloadable software and software applications for cyber security purposes; downloadable software platforms for cyber security purposes; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and internet use security and protection; downloadable software and software platforms for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for use of virtual private networks (VPN) for use in for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; cloud servers; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks in the nature of pre-recorded USB flash drives featuring a platform for cyber security purposes; downloadable USB operating software; downloadable software and software device drivers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to a global computer information network on the Internet; data transfer rerouting by telecommunications; secure data transfer via computer networks by telecommunications; information, advisory and consultancy services relating to all the aforementioned services, namely, telecommunications; Business management consulting services in the field of information technology; data processing, systematisation into computer databases and database management; collection of data, namely, electronic data collection for business purposes in the field of information technology; computerised data processing; management of computer databases and compilation of information into computerised databases; information, advisory and consultancy services relating to all the aforesaid services, namely, business management consulting and business advisory; Licensing of technology, namely, licensing of intellectual property in the field of patents and copyrights; Licensing services, namely, licensing of software; "SECURE"; Scientific and technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks for others in the field of cyber security; development of new technology for others in the field of cyber security and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; technology consultancy in the field of cyber security, internet security, computer security, computer network security and data security; researching, designing, developing, implementing, maintaining and updating software in the field of cyber security and information security, including software for scanning, monitoring, analyzing and managing computer systems, the internet, and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; providing online non-downloadable software for preventing cyberattacks for cyber security and information security; researching, designing, implementing, maintaining and updating software in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection software; researching, designing, implementing, maintaining and updating software in the field of data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; network protection services in the nature of computer network security consultancy; data compression of computer data; data leakage prevention services in the nature of computer network security consultancy; IT services in the field of cyber security, namely, data security consultancy; computer security consultancy services for protection against illegal network access; digital compression of computer data; electronic monitoring of computer networks for computer security purposes for prevention of data leakage; information technology (IT) programming services; IT consultancy, advisory and information services; IT security, protection and restoration services in the nature of computer network security consultancy; Information technology support services in the nature of computer network security consultancy; computer data recovery services, namely, information technology restoration services in the field of data and applications; endpoint cyber security services in the nature of restricting unauthorized access to computer systems; outsource service providers in the field of information technology; technical support services relating to computer software and software applications, namely, troubleshooting of security software problems; monitoring of network and computer systems for security software problems for quality control purposes; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes for security software problems for quality control purposes; providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PaaS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; infrastructure as a service (IaaS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud computing services, namely, cloud computing featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; administration of cloud servers, namely, technical administration of services for others; quality control for others and authentication services in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security
Owner:
Serial:97145136
Filed:Nov 28, 2021
Classes:9, 35, 38, +3
Registration:8017100
Registered:Nov 11, 2025
Goods & Services
Educational services, namely, conducting seminars, conferences and workshops in the field of cyber security; providing of training in the field of cyber security; Arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable, in the nature of information technology in the field of cyber security; Downloadable software and software applications for cyber security purposes; Downloadable software platforms for cyber security purposes; Downloadable software and software platforms for detecting and responding to cyber threats and attacks; Downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; Downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; Downloadable software and software platforms for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; Downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; Downloadable software for use of virtual private networks (VPN) for use in for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Cloud servers; Downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Wireless routers; Computer network routers; Computer hardware; Computer peripherals; USB hardware and USB sticks in the nature of pre-recorded USB flash drives featuring a platform for cyber security purposes; Downloadable USB operating software; Downloadable software and software device drivers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, for scanning and managing vulnerabilities; downloadable electronic publications in the nature of information technology in the field of cyber security; Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to a global computer information network on the Internet; data transfer rerouting services, namely, telecommunications; secure data transfer via computer networks by telecommunications; information, advisory and consultancy services relating to all the aforementioned services, namely, telecommunications; none of the foregoing in relation to team, employee interaction, or collaboration for business purposes; Business management consulting services in the field of information technology; Data processing, systematisation into computer databases and database management; Collection of data, namely, electronic data collection for business purposes in the field of information technology; Computerised data processing; Management of computer databases and compilation of information into computerised databases; Information, advisory and consultancy services relating to all the aforesaid services, namely, business management consulting and business advisory; Licensing of technology, namely, licensing of intellectual property in the field of patents and copyrights; Licensing services, namely, licensing of software; information, advisory and consultation services in the field of data theft and identity theft, namely, cyber security consultation; providing information and consultation relating to cyber security; Scientific and technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks for others in the field of cyber security; development of new technology for others in the field of cyber security and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; technology consultancy in the field of cyber security, Internet security, computer security, computer network security and data security; researching, designing, developing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the nature of information technology in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the nature of information technology in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the nature of information technology in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; network protection services in the nature of information technology; data compression of computer data; data leakage prevention services in the nature of information technology; IT services in the field of cyber security; IT consultancy, advisory and information services; IT security, protection and restoration services in the nature of information technology; Information technology support services in the nature of information technology security; technical support services relating to computer software and software applications, namely, troubleshooting of security software problems; monitoring of network and computer systems for security software problems; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes for security software problems; Providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PaaS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IaaS)featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud services, namely, cloud computing featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; quality control for others and authentication services in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security
Owner:
Serial:97099822
Filed:Oct 29, 2021
Classes:9, 35, 38, +3
Registration:7381366
Registered:May 7, 2024
Goods & Services
Educational services, namely, conducting seminars, conferences and workshops in the field of cyber security; providing of training in the field of cyber security; Arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable, namely, manuals featuring information technology in the field of cyber security; Downloadable software and software applications for cyber security purposes; Downloadable software platforms for cyber security purposes; Downloadable software and software platforms for detecting and responding to cyber threats and attacks; Downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; Downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; Downloadable software and software platforms for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; Downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; Downloadable software for use of virtual private networks (VPN) for use in for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Cloud servers; Downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Wireless routers; Computer network routers; Computer hardware; Computer peripherals; USB hardware and USB sticks in the nature of pre-recorded USB flash drives featuring a platform for cyber security purposes ; Downloadable USB operating software; Downloadable software and software device drivers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to a global computer information network on the Internet; data transfer rerouting by telecommunications; secure data transfer via computer networks by telecommunications; information, advisory and consultancy services relating to all the aforementioned services, namely, telecommunications; Business management consulting services in the field of information technology; Data processing, systematisation into computer databases and database management; Collection of data, namely, electronic data collection for business purposes in the field of information technology; Computerised data processing; Management of computer databases and compilation of information into computerised databases; Information, advisory and consultancy services relating to all the aforesaid services, namely, business management consulting and business advisory; Licensing of technology, namely, licensing of intellectual property in the field of patents and copyrights; Licensing services, namely, licensing of software; Scientific and technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks for others in the field of cyber security; development of new technology for others in the field of cyber security and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; technology consultancy in the field of cyber security, Internet security, computer security, computer network security and data security; researching, designing, developing, implementing, maintaining and updating software in the field of cyber security and information security, including software for scanning, monitoring, analyzing and managing computer systems, the Internet, and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; researching, designing, implementing, maintaining and updating software in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection software; researching, designing, implementing, maintaining and updating software in the field of data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; network protection services in the nature of computer network security consultancy; data compression of computer data; data leakage prevention services in the nature of computer network security consultancy; IT services in the field of cyber security, namely, data security consultancy; IT consultancy, advisory and information services; IT security, protection and restoration services in the nature of computer network security consultancy; Information technology support services in the nature of computer network security consultancy; technical support services relating to computer software and software applications, namely, troubleshooting of security software problems; monitoring of network and computer systems for security software problems for quality control purposes; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes for security software problems for quality control purposes; Providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PaaS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IaaS)featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud services, namely, cloud computing featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; quality control for others and authentication services in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security
Goods & Services
Software for use in digital security, anti-virus protection, anti-theft protection, backup, online banking, secure messaging, email security, safe browsing, parental control, software updates, remote device management; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing
Goods & Services
Software for use in digital security, anti-virus protection, anti-theft protection, backup, online banking, secure messaging, email security, safe browsing, parental control, software updates, remote device management; [ software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; ] software for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; [ Telecommunication services in the areas of delivery of messages by electronic transmission; ] providing virtual private networks (VPN) services; private electronic messaging; providing digital locating services in the nature of locating services for digital devices including tablet computers and smartphones; [ electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the internet, intranets, extranets, television, mobile networks, cellular and satellite networks ]; Researching, designing, implementing and updating software for use in digital security, anti-virus protection, anti-theft protection, backup, online banking, secure messaging, email security, safe browsing, parental control, software updates and remote device management; [ providing software as a service (SAAS) services featuring software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; digital hosting services which allow the user to publish and share their data, content and images on-line; cloud hosting provider services featuring content sharing, aggregation, streaming and synchronization services for digital devices; ] providing digital services in the nature of providing online non-downloadable software for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression and data leakage prevention; recording data for others on digital media for storage of secure notes and data; computer services, namely, hosting an interactive website which allows users to participate in private messaging and location sharing; consulting in the field of information technology; information, advisory and consultancy services relating to above
Goods & Services
Security software for use in computers and mobile devices for use in detecting and protecting against attacks on and unauthorized access to computer and mobile devices; software for anti-virus protection, [ anti-theft protection, backup, ] online banking protection, electronic messaging protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, software updates, computer and device performance enhancement, use of virtual private networks (VPN), anti-tracking, privacy protection, virtual location management, information network protection [ and data leakage prevention ] ; [ software for vulnerability management, risk assessment and information security policy compliance; software for scanning, monitoring and analysis of software applications, computer systems and information networks; ] software for assessment of information security vulnerabilities [ and data protection risks ] ; software [ and hardware ] for protecting routers; scanning software for securing data [ ; computers and peripherals for anti-virus protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, use of virtual private networks (VPN), anti-tracking, privacy protection, information network protection, and data leakage prevention ]; Telecommunication services in the field of private and secure Internet browsing; [ private and secure electronic messaging; ] providing virtual private network (VPN) services; communication via virtual private networks [ ; data transfer re-routing ]; Researching, designing, implementing and updating software; support services, namely, technical support services in the nature of troubleshooting of security software problems, providing technical advice relating to installation of security software and maintenance services for security software; information security services for computers and mobile devices in the nature of maintaining software security; information security services for computer networks in the nature of encrypting network communication; services for internet and information network analytics; scanning services for detecting information security vulnerabilities; consulting in the field of information security; computer programming; monitoring and assessing information security risks of computer networks, websites and devices; monitoring computer network systems; information, advice and reporting services in the fields of information security and information technology
Goods & Services
Software for use on desktops, laptops, servers, mobile devices, and networks and designed to work over the Internet, cloud computing and computer software system networks in the areas of security and digital life-style on virtual private networks (VPN), namely, anonymous browsing, encryption,[ anti-virus protection,] anti-tracking protection, location of persons and things, network protection, privacy protection [, data compression and data leakage prevention]; [ [Telecommunication services, namely, electronic transmission and retrieval of data, images, audio, video and documents, namely, text, electronic messages, and electronic mail, over local or global communications networks, namely, the internet, intranets, extranets, television, mobile networks, cellular and satellite networks;] telecommunications services for providing multiple-user access to a global computer network[; communications by computer terminals; communication between computer terminals; streaming of audio and video materials and files via global computer network; delivery of messages by electronic transmission; electronic mail services; information, advisory and consultancy services relating to all the aforesaid] ]; [ [Scientific and technological services, namely, research and design services in the field of computer software; researching and developing computer software] designing, implementing and updating software solutions for virtual private networks (VPN), namely, anonymous browsing, encryption, [anti-virus protection, ] anti-tracking protection, location of persons and things, network protection, privacy protection, data compression and data leakage prevention; computer services, namely, cloud hosting provider services; cloud computing featuring software for virtual private networks (VPN), namely, anonymous browsing, encryption, anti-virus protection, anti-tracking protection, network protection, privacy protection[, data compression and data leakage prevention] ]