EUTM file information

019066883

IstroSec Gryphon


August 12, 2024

Trademark Summary

The trademark application IstroSec Gryphon was filed by IstroSec s. r. o., a corporation established under the laws of the Slovak Republic (the "Applicant"). The application was published for oppositions on September 22, 2024, and still open for oppositions.

The application was filed in Slovak (English was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer software for testing vulnerability in computers and computer networks
    2. Computer software for the monitoring of computer systems
    3. Computer software for use in computer access control
    4. Antivirus software
    5. Software
    6. Computer firewall software
    7. Software
    8. Antispyware software
    9. Computer operating programs
    10. Cryptography software
    11. Encoded programs
    12. Computer systems
    13. Risk detection software
    14. Utility, security and cryptography software
    15. Cloud network monitoring software
    16. Computer software for system cleaning and optimization
    17. Utility programs for performing computer system diagnostics
    18. Computer software for the detection of threats to computer networks
    19. Downloadable computer software for remote monitoring and analysis
    20. Artificial intelligence software for analysis
    21. Debugging software
    22. Hardware testing software
    23. Software for protecting, managing and authenticating usernames and passwords, protecting against malicious software (malware) and phishing threats, data-loss and identity theft and fraud
    24. Security software for computers, mobile phones, tablets, and personal digital assistants.
  • The mark was filed in class 42 with following description of goods:
    1. Research, development, design and upgrading of computer software
    2. IT security, protection and restoration
    3. IT services
    4. Internet security consultancy
    5. Advisory services relating to computer programming
    6. Updating of computer software relating to computer security and prevention of computer risks
    7. Maintenance of computer software relating to computer security and prevention of computer risks
    8. Computer security system monitoring services
    9. Authentication services for computer security
    10. Professional consultancy relating to computer security
    11. Computer security services for protection against illegal network access
    12. Development of software for secure network operations
    13. Computer firewall services
    14. Programming of Internet security programs
    15. Updating of computer programs
    16. Design of information systems
    17. Compilation of information relating to information systems
    18. Advisory services relating to computer based information systems
    19. Provision of computer security risk management programs
    20. Computer system analysis
    21. Monitoring of computer system operation by remote access
    22. Monitoring of computer systems for detecting unauthorized access or data breach
    23. Information services relating to the development of computer systems
    24. Monitoring of computer systems to detect breakdowns
    25. Monitoring of computer systems for security purposes
    26. Monitoring of network systems
    27. Expert opinion relating to technology
    28. Surveying [engineering]
    29. Computer virus protection services
    30. IT services
    31. Consultancy and information services relating to information technology
    32. User authentication services using single sign-on technology for online software applications
    33. User authentication services using blockchain technology
    34. Administration of user rights in computer networks
    35. Computer programming
    36. Computer consultancy and advisory services
    37. Computer programming
    38. Computer forensics
    39. Computer diagnostic services
    40. Provision of security services for computer networks, computer access and computerised transactions
    41. Computer virus protection services
    42. Computer security services in the nature of administering digital certificates
    43. Computer software technical support services
    44. Cloud-based data protection services
    45. Data security consultancy
    46. Software engineering services for data processing
    47. Data security services [firewalls]
    48. Electronic monitoring of personally identifying information to detect identity theft via the internet
    49. IT services for data protection
    50. Information technology [IT] support services [troubleshooting of software]
    51. IT project management
    52. Access Control as a Service (ACaaS)
    53. Installation of Access Control as a Service (ACaaS) software
    54. Advisory services relating to computer systems analysis
    55. Computer security threat analysis for protecting data
    56. Computer programming services for electronic data security
    57. Design and development of electronic data security systems
    58. Computer system monitoring services
    59. Computer software consultancy
    60. Analytical services relating to computer programmes
    61. Providing online non-downloadable computer software
    62. Platforms for artificial intelligence as software as a service [SaaS]
    63. Consulting in the field of cloud computing networks and applications
    64. Rental of operating software for accessing and using a cloud computing network
    65. Programming of operating software for accessing and using a cloud computing network
    66. Consultancy in the field of security software
    67. Professional advisory services relating to computer software
    68. Software development, programming and implementation
    69. Data security services
    70. Diagnosis of faults in computer software
    71. Software engineering
    72. Ethical hacking
    73. Consultancy services and Consultancy, Relating to the following sectors: Ethical hacking
    74. Computer software development and systems development, Programming and implementation of computer software, Computer software consultancy
    75. Information technology consulting
    76. Security in the field of computing
    77. Protection against illegal network breaches
    78. Cybersecurity consultancy
    79. Expertise, in the following fields: Computer software, Computer security, IT services
    80. Creating and maintaining websites for others
    81. Installation and duplication of computer programs
    82. Maintenance of computer software.