SOPHOS LIMITED

 SOPHOS LIMITED contact information is shown below
Owner:SOPHOS LIMITED
Owner Address:The Pentagon, Abingdon Science Park Abingdon OX143YP United Kingdom
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned bySOPHOS LIMITED

Brand:

CYBERSECURITY DELIVERED

Description:

(Based on Intent to Use) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services(Based on 44(d) Priority Application) Computer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services;(Based on Intent to Use) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software for IT infrastructure and cybersecurity automation; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software for IT infrastructure and cybersecurity automation; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key;(Based on Intent to Use) Action figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys(Based on 44(d) Priority Application) Action figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys;(Based on Intent to Use) Markers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, namely, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Stickers(Based on 44(d) Priority Application) Markers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, namely, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Stickers;(Based on Intent to Use) Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication access services(Based on 44(d) Priority Application) Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication access services;(Based on Intent to Use) Installation, maintenance and repair of computer hardware; Technical support services, namely, troubleshooting in the nature of the repair of computer hardware(Based on 44(d) Priority Application) Installation, maintenance and repair of computer hardware; Technical support services, namely, troubleshooting in the nature of the repair of computer hardware;CYBER SECURITY DELIVERED;(Based on Intent to Use) Baseball caps and hats; Clothing, namely, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear(Based on 44(d) Priority Application) Baseball caps and hats; Clothing, namely, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear;(Based on Intent to Use) Business administration services; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software(Based on 44(d) Priority Application) Business administration services; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software;(Based on Intent to Use) Providing information on the development of privacy, security and data governance law via a website(Based on 44(d) Priority Application) Providing information on the development of privacy, security and data governance law via a website;(Based on Intent to Use) Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty(Based on 44(d) Priority Application) Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty;(Based on Intent to Use) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity(Based on 44(d) Priority Application) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity;

Category: BASED ON INTENT USE
Brand:

CYBERSECURITY MADE SIMPLE

Description:

Educational services, namely, providing educational technical demonstrations, presentations, workshops, and training seminars in the fields of information technology, computers, data security, computer security, and network security; Computer education training services; Providing educational demonstrations;The mark consists of stylized words Cybersecurity Made Simple in light blue, appearing against a dark blue rectangular background.;Anti-spyware software; Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer software for monitoring, protecting, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer anti-virus software; USB (universal serial bus) hardware; Computer software for administration of computer networks; Computer hardware, namely, wireless access point (WAP) devices;Bicycle gloves; Hats; Jackets; Shirts; Socks; Sports pants; Sweatshirts; Cyclists' jerseys; Sports caps and hats; Sports jerseys;The color(s) light blue and dark blue is/are claimed as a feature of the mark.;Computer security threat analysis for protecting data; Hosting an on-line community web site featuring information in the field of computer security; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Providing on-line non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer virus protection services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of non-downloadable computer anti-virus software; Technical support services, namely, troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks;

Category: EDUCATIONAL SERVICES
Brand:

INTERCHECK

Description:

Computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer software for for enforcing data policies in the field of network security, data security, and computer security; Computer anti-virus software;INTER CHECK;

Category: COMPUTER SOFTWARE MANAGING
Brand:

NAKED SECURITY

Description:

On-line journals, namely, blogs featuring information in the field of network security, including viruses, spyware, adware, intrusion, spam and malicious URLs;The drawing is amended to appear as follows: NAKED SECURITY;NAKED SECURITY;SECURITY;

Category: ON LINE JOURNALS
Brand:

PUREMESSAGE

Description:

Computer software for managing and protecting electronic messaging systems by means of electronic mail filtering, anti-spam protection, anti-virus protection and message policy enforcement;Computer services, namely, managing and protecting electronic messaging systems by means of electronic mail filtering, anti-spam protection, anti-virus protection and message policy enforcement;

Category: COMPUTER SOFTWARE MANAGING
Brand:

ROOK SECURITY

Description:

SECURITY;Computer diagnostic services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy being computer forensic services; Computer security consultancy in the field of computer disaster recovery planning; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;

Category: SECURITY
Brand:

S

Description:

The mark consists of the letter S inside of a shield.;Computer hardware; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies in the field of network security, data security, and computer security; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer programs for use in management and protection of devices and networks in the field of network security, data security, and computer security; computer software for use in scanning of data, e-mails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints to reduce threats from malware and intrusion; computer compliance software in the field of network security, data security, and computer security; computer software for use in filtering Internet content, for use in managing, checking, and protecting networks, computers, and mobile devices; downloadable electronic publications in the nature of weblogs, blogs, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices;Color is not claimed as a feature of the mark.;Computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies in the field of network security, data security, and computer security; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable software for ensuring compliance in the field of network security, data security, and computer security; Providing on-line, non-downloadable software for use in filtering Internet content, for use in the secure management of Internet content featuring securing content against unauthorized intrusion attempts, the presence of viruses, spamware, spam, malware, malicious code, spyware, and adware, and for use in Internet content-checking and data content-checking in the nature of verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from Internet content and verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from electronic data; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials;

Category: