GleanMark

SOPHOSLABS INTELIX Trademark

SOPHOSLABS INTELIX is a USPTO trademark filed by Sophos Limited. Status: Registered.

Trademark Facts

MarkSOPHOSLABS INTELIX
Serial Number88692079
Registration Number6084321
StatusRegistered
Filing Date2019-11-14
Registration Date2020-06-23
Mark TypeWord
Nice Classes042 (Software & IT)
OwnerSophos Limited
Attorney of RecordIra Heffan
Prosecution Events17
Latest EventC15A on 2026-01-17

Goods & Services

(Based on Use in Commerce) Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing an on-line searchable database in the field of software, data, computer, and network security for personal and business purposes and for scientific research purposes; Providing temporary use of on-line non-downloadable cloud computing software for use in on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable cloud computing software for for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable cloud computing software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer anti-virus software(Based on 44(d) Priority Application) Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing an on-line searchable database in the field of software, data, computer, and network security for personal and business purposes and for scientific research purposes; Providing temporary use of on-line non-downloadable cloud computing software for use in on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable cloud computing software for for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable cloud computing software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer anti-virus software(Based on 44(e)) Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing an on-line searchable database in the field of software, data, computer, and network security for personal and business purposes and for scientific research purposes; Providing temporary use of on-line non-downloadable cloud computing software for use in on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of on-line non-downloadable cloud computing software for for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable cloud computing software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer anti-virus software

Related