on 5 May 2015
Last Applicant/ Owned by
Csecure AG
Gustav-Heinemann-Ufer 54
Köln, , 50968
Serial Number
UK00913847661 filed on 5th May 2015
Registration Number
UK00913847661 registered on
7th Dec 2015
Correspondent Information
INTERNATIONAL IP MANAGEMENT & CONSULTING LTD
15-17 Middle Street
Brighton,
BN1 1AL
Installation and repair of computer networks and telecommunications networks, networks, computer hardware; Installation and repair of IT security technology, information risk management technology, IT security systems; Repair information; Installation and repair in the fields of information technology, IT security, information risk management, IT security technology, IT security systems, IT security solutions, perimeter security, content security, web application security, network security, mobile device security; Installation and repair of computer hardware, in particular in the fields of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection against unauthorised access, system monitoring, mobile device protection, identity management, access management, guideline compliance; Installation and repair of computer hardware for managing e-mails, vulnerability and threat management, risk management, content security, managed perimeter security, infrastructure security, virtual private networks (VPNs), remote access, secure communications connections, firewall systems; Installation, configuration, updating, implementation, integration, maintenance and servicing, modification and expansion of computer hardware; Installation and repair of computer hardware for detecting unauthorised access, preventing unauthorised access, authentication.
Telecommunications; providing user access to computer and telecommunication networks, IT-platforms, IT-infrastructures, data and information, data bases, computer software; providing of secure internet accesses; Message sending; Email services; Providing of access to interactive communications networks and data processing systems for transmitting data and information; Transmission of data and information; Telecommunications routing and junction services; Communications by telephone or by computer terminals; providing of a support centre, a call centre, an information hotline, an emergency hotline; All the aforesaid services included in class 38, in particular in the fields of information technology (IT), IT security, information risk management, IT security technology, IT security systems, IT security solutions, perimeter security, content security, web application security, network security; Telecommunications services in connection with mobile device security, detecting unauthorised access, preventing unauthorised access, authentication, in particular in the fields of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data; Telecommunications services in connection with protection against unauthorised access, system monitoring, mobile device protection, identity management and/or access management, guideline compliance, managing e-mails, vulnerability and threat management, risk management, content security, managed perimeter security, infrastructure security, virtual private networks (VPNs), remote access, secure communications connections, firewall systems.
Design and development of computer hardware; Installation and repair of computer software for detecting unauthorised access, preventing unauthorised access, authentication; Installation and repair of computer software, in particular in the fields of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection against unauthorised access, system monitoring, mobile device protection, identity management, access management, guideline compliance; Installation and repair of computer software for managing e-mails, vulnerability and threat management, risk management, content security, managed perimeter security, infrastructure security, virtual private networks (VPNs), remote access, secure communications connections, firewall systems; Consultancy in the field of IT security; Industrial analysis and research; Engineering services; Technical research; Technical consultancy; Surveying (survey reports, engineering); Technical project studies; Technical analysis; Engineering project management services; Technical evaluation; information security consulting, in particular in the field of security governance, management and strategy, assets and risk management, compliance, standards and regulations, threats and vulnerabilities, technical architecture, programme and project management; technology security consulting, in particular in the field of assessments and reviews, design and audit, configuration, deployment and policies, risk assessments, support management, asset management and decommission; Providing of IT security solutions and information risk management solutions; Computer hardware and software consultancy; Computer programming; computer protection services; Computer systems analysis; Recovery of computer data; Design, development, installation, configuration, updating, implementation, integration, maintenance and servicing, modification and expansion of computer hardware, computer software updates, downloadable computer software, databases (computer software), operating systems (computer software), computer networks (computer software), IT platforms (computer software), IT infrastructures (computer software); cloud deployment services; technical support, also remote, via hotline or telephone; Backup of computer data (IT security); Electronic data storage; technical administration of accesses to computer networks; provision of technical security directives; inspection of technical guidelines and processes; All the aforesaid services included in class 42, in particular in the fields of information technology (IT), IT security, information risk management, IT security technology, IT security systems, IT security solutions, perimeter security, content security, web application security, network security, mobile device security; All the aforesaid services included in class 42, in particular in the fields of detecting unauthorised access, preventing unauthorised access, authentication; All the aforesaid services included in class 42, in particular in the fields of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection against unauthorised access, system monitoring, mobile device protection; All the aforesaid services included in class 42, in particular in the fields of identity management and/or access management, guideline compliance, managing e-mails, vulnerability and threat management, risk management, content security, managed perimeter security, infrastructure security, virtual private networks (VPNs), remote access, secure communications connections, firewall systems.
UK00913847661
Word
Individual