GleanMark

SOPHOS XDR SENSOR Trademark

SOPHOS XDR SENSOR is a USPTO trademark filed by Sophos Limited. Status: Registered.

Trademark Facts

MarkSOPHOS XDR SENSOR
Serial Number97602943
Registration Number7115204
StatusRegistered
Filing Date2022-09-22
Registration Date2023-07-18
Mark TypeWord
Nice Classes009 (Electronics & Software)
OwnerSophos Limited
Attorney of RecordIra Heffan
Prosecution Events15
Latest EventNRCC on 2023-07-18

Goods & Services

Class 009: (Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer programs for data-security; Downloadable computer software for encryption; Downloadable computer software for use in IT infrastructure and cybersecurity automation; Downloadable computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet and mobile applications; Downloadable computer software for use in managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware, and unauthorized data and programs on computers and electronic devices; Downloadable computer software for use in threat-reduction scanning of data, emails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; Downloadable electronic data files featuring documentation, operational data, alerts, and news updates in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable mobile applications for enforcing data policies; Downloadable software for ensuring the security of electronic mail; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key(Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer programs for data-security; Downloadable computer software for encryption; Downloadable computer software for use in IT infrastructure and cybersecurity automation; Downloadable computer software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet and mobile applications; Downloadable computer software for use in managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware, and unauthorized data and programs on computers and electronic devices; Downloadable computer software for use in threat-reduction scanning of data, emails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; Downloadable electronic data files featuring documentation, operational data, alerts, and news updates in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Downloadable mobile applications for enforcing data policies; Downloadable software for ensuring the security of electronic mail; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key

Related