EUTM file information

018658284

CYCRAFT


February 20, 2022

Trademark Summary

The trademark application CYCRAFT was filed by CyCraft Singapore Pte. Ltd., a corporation established under the laws of the Republic of Singapore (the "Applicant"). The application was published for oppositions on March 16, 2022, and it was registered by office on June 23, 2022 without any oppositions.

The application was filed in English (German was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable programs for analyzing whether computer systems have been breached
    2. Downloadable programs for analyzing whether local area networks have been breached
    3. Downloadable programs for collecting and filtering networking behavior records of computers
    4. Downloadable programs for detecting malware infection
    5. Downloadable programs for monitoring computer networking behaviors
    6. Downloadable software
    7. Downloadable software for analyzing and detecting attacker invasion
    8. Downloadable software for analyzing whether computer systems have been breached
    9. Downloadable software for analyzing whether local area networks have been breached
    10. Downloadable software for collecting and filtering networking behavior records of computers
    11. Downloadable software for detecting malware infection
    12. Downloadable software for monitoring computer networking behaviors
    13. Downloadable software platforms for analyzing and detecting attacker invasion
    14. Downloadable software platforms for analyzing whether computer systems have been breached
    15. Downloadable software platforms for analyzing whether local area networks have been breached
    16. Downloadable software platforms for collecting and filtering networking behavior records of computers
    17. Downloadable software platforms for detecting malware infection
    18. Downloadable software platforms for monitoring computer networking behaviors
    19. Recorded computer operating programs
    20. Recorded programs for analyzing and detecting attacker invasion
    21. Recorded programs for analyzing whether computer systems have been breached
    22. Recorded programs for analyzing whether local area networks have been breached
    23. Recorded programs for collecting and filtering networking behavior records of computers
    24. Recorded programs for detecting malware infection
    25. Recorded programs for monitoring computer networking behaviors
    26. Recorded software for analyzing and detecting attacker invasion
    27. Recorded software for analyzing whether computer systems have been breached
    28. Recorded software for analyzing whether local area networks have been breached
    29. Recorded software for collecting and filtering networking behavior records of computers
    30. Recorded software for detecting malware infection
    31. Recorded software for monitoring computer networking behaviors
    32. Recorded software platforms
    33. Recorded software platforms for analyzing and detecting attacker invasion
    34. Recorded software platforms for analyzing whether computer systems have been breached
    35. Recorded software platforms for analyzing whether local area networks have been breached
    36. Recorded software platforms for collecting and filtering networking behavior records of computers
    37. Recorded software platforms for detecting malware infection
    38. Recorded software platforms for monitoring computer networking behaviors
    39. Recorded software, namely, monitors
    40. Downloadable programs for analyzing and detecting attacker invasion.
  • The mark was filed in class 42 with following description of goods:
    1. Cloud computing services
    2. Computer programming services for data processing
    3. Computer security consultancy
    4. Computer software consultancy
    5. Computer software design
    6. Computer system analysis
    7. Computer virus, malware, worms, trojans, spyware, adware, ransomware and data exfiltration protection services
    8. Data encryption services
    9. Data security consultancy
    10. Internet security consultancy
    11. Maintenance of computer software
    12. Monitoring of computer systems by online scanning, machine learning and digital forensics technology
    13. Monitoring of computer systems by remote access
    14. Monitoring of computer systems for detecting data breach
    15. Monitoring of computer systems for detecting unauthorized access
    16. Monitoring of computer systems to detect breakdowns
    17. Network security administration service
    18. Network security administration services, namely, restricting computer networks to access malicious domains
    19. Network security administration services, namely, restricting computer networks to access malicious web sites
    20. Platform as a service, namely, PaaS
    21. Software as a service, namely, SaaS
    22. Updating of computer software.