GleanMark

SOPHOS DEFEAT CYBERATTACKS Trademark

SOPHOS DEFEAT CYBERATTACKS is a USPTO trademark filed by Sophos Limited. Status: Registered.

Trademark Facts

MarkSOPHOS DEFEAT CYBERATTACKS
Serial Number98897732
Registration Number8027896
StatusRegistered
Filing Date2024-12-11
Registration Date2025-11-18
Mark TypeWord
Nice Classes009 (Electronics & Software), 025 (Clothing & Footwear), 035 (Advertising & Business), 038 (Telecommunications), 041 (Education & Entertainment), 042 (Software & IT)
OwnerSophos Limited
Attorney of RecordIra Heffan
Prosecution Events15
Latest EventR.PR on 2025-11-18

Goods & Services

Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars for others in the field of cybersecurity; Providing information relating to education services; Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for automation of IT infrastructure and cybersecurity; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key; Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication access services; Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg warmers; Outer jackets; Visors being headwear; Clothing, namely, arm warmers; Business administration services; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish software system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity

Related