SOPHOS CYBERSECURITY DELIVERED.

Welcome to the Brand page for “SOPHOS CYBERSECURITY DELIVERED.”, which is offered here for (based on intent to use) computer education training; educational services, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; providing information relating to education services(based on 44(d) priority application) computer education training; educational services, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; providing information relating to education services(based on 44(e)) computer education training; educational services, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; providing information relating to education services;sophos cyber security delivered;the mark consists of a stylized phrase sophos cybersecurity delivered.;(based on intent to use) battery chargers for mobile phones; cases for mobile phones; computer hardware; computer hardware, wireless access point (wap) devices; downloadable computer anti-virus software; downloadable computer software for encryption; downloadable computer software for it infrastructure and cybersecurity automation; downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the internet and mobile devices; downloadable software for ensuring the security of electronic mail; downloadable software for cybersecurity; downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; mouse pads; usb computer security key(based on 44(d) priority application) battery chargers for mobile phones; cases for mobile phones; computer hardware; computer hardware, wireless access point (wap) devices; downloadable computer anti-virus software; downloadable computer software for encryption; downloadable computer software for it infrastructure and cybersecurity automation; downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the internet and mobile devices; downloadable software for ensuring the security of electronic mail; downloadable software for cybersecurity; downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; mouse pads; usb computer security key(based on 44(e)) battery chargers for mobile phones; cases for mobile phones; computer hardware; computer hardware, wireless access point (wap) devices; downloadable computer anti-virus software; downloadable computer software for encryption; downloadable computer software for it infrastructure and cybersecurity automation; downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the internet and mobile devices; downloadable software for ensuring the security of electronic mail; downloadable software for cybersecurity; downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; mouse pads; usb computer security key;(based on intent to use) action figure toys; balls for sports; golf divot repair tools; golf tees; playing cards; puzzles; spinning fidget toys(based on 44(d) priority application) action figure toys; balls for sports; golf divot repair tools; golf tees; playing cards; puzzles; spinning fidget toys(based on 44(e)) action figure toys; balls for sports; golf divot repair tools; golf tees; playing cards; puzzles; spinning fidget toys;(based on intent to use) markers; paper and cardboard; pens; printed calendars; printed instructional and teaching materials in the field of information technology; printed matter, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; staplers being office requisites; stationery; stickers(based on 44(d) priority application) markers; paper and cardboard; pens; printed calendars; printed instructional and teaching materials in the field of information technology; printed matter, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; staplers being office requisites; stationery; stickers(based on 44(e)) markers; paper and cardboard; pens; printed calendars; printed instructional and teaching materials in the field of information technology; printed matter, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; staplers being office requisites; stationery; stickers;(based on intent to use) communication by computer terminals; information transmission via electronic communications networks; providing telecommunications connections to a global computer network; providing virtual private network (vpn) services, private and secure electronic communications over a private or public computer network; telecommunication access services(based on 44(d) priority application) communication by computer terminals; information transmission via electronic communications networks; providing telecommunications connections to a global computer network; providing virtual private network (vpn) services, private and secure electronic communications over a private or public computer network; telecommunication access services(based on 44(e)) communication by computer terminals; information transmission via electronic communications networks; providing telecommunications connections to a global computer network; providing virtual private network (vpn) services, private and secure electronic communications over a private or public computer network; telecommunication access services;(based on intent to use) installation, maintenance and repair of computer hardware; technical support services, troubleshooting in the nature of the repair of computer hardware(based on 44(d) priority application) installation, maintenance and repair of computer hardware; technical support services, troubleshooting in the nature of the repair of computer hardware(based on 44(e)) installation, maintenance and repair of computer hardware; technical support services, troubleshooting in the nature of the repair of computer hardware;(based on intent to use) baseball caps and hats; clothing, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; footwear; visors being headwear(based on 44(d) priority application) baseball caps and hats; clothing, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; footwear; visors being headwear(based on 44(e)) baseball caps and hats; clothing, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; footwear; visors being headwear;color is not claimed as a feature of the mark.;(based on intent to use) business administration services; business services, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; customer service management for others; database management; promoting the use of the security assurance best practices of others in the field of cloud computing; providing a website used to place on-line commercial orders in the field of computer hardware and computer software; value-added reseller services, distributorship services featuring computer security and information technology products; wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software(based on 44(d) priority application) business administration services; business services, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; customer service management for others; database management; promoting the use of the security assurance best practices of others in the field of cloud computing; providing a website used to place on-line commercial orders in the field of computer hardware and computer software; value-added reseller services, distributorship services featuring computer security and information technology products; wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software(based on 44(e)) business administration services; business services, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; customer service management for others; database management; promoting the use of the security assurance best practices of others in the field of cloud computing; providing a website used to place on-line commercial orders in the field of computer hardware and computer software; value-added reseller services, distributorship services featuring computer security and information technology products; wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software;(based on intent to use) providing information on the development of privacy, security and data governance law via a website(based on 44(d) priority application) providing information on the development of privacy, security and data governance law via a website(based on 44(e)) providing information on the development of privacy, security and data governance law via a website;(based on intent to use) drinking vessels; household containers for foods; lunch boxes; water bottles sold empty(based on 44(d) priority application) drinking vessels; household containers for foods; lunch boxes; water bottles sold empty(based on 44(e)) drinking vessels; household containers for foods; lunch boxes; water bottles sold empty;(based on intent to use) cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; computer security consultancy; computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish it infrastructure and cybersecurity automation; computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software development; computer virus protection services; consultation services relating to computer software; installation, maintenance and repair of computer software; software as a service (saas) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; software as a service (saas) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; software authoring; technical support services, troubleshooting of computer software problems; technology consultation in the field of cybersecurity(based on 44(d) priority application) cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; computer security consultancy; computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish it infrastructure and cybersecurity automation; computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software development; computer virus protection services; consultation services relating to computer software; installation, maintenance and repair of computer software; software as a service (saas) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; software as a service (saas) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; software authoring; technical support services, troubleshooting of computer software problems; technology consultation in the field of cybersecurity(based on 44(e)) cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; computer security consultancy; computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish it infrastructure and cybersecurity automation; computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software development; computer virus protection services; consultation services relating to computer software; installation, maintenance and repair of computer software; software as a service (saas) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; software as a service (saas) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; software authoring; technical support services, troubleshooting of computer software problems; technology consultation in the field of cybersecurity;.

Its status is currently believed to be active. Its class is unavailable. “SOPHOS CYBERSECURITY DELIVERED.” is believed to be currently owned by “SOPHOS LIMITED”.

Owner:
SOPHOS LIMITED
Owner Details
Description:
(Based on Intent to Use) Computer education training; Educational services, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services(Based on 44(d) Priority Application) Computer education training; Educational services, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services(Based on 44(e)) Computer education training; Educational services, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services;SOPHOS CYBER SECURITY DELIVERED;The mark consists of a stylized phrase SOPHOS CYBERSECURITY DELIVERED.;(Based on Intent to Use) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software for IT infrastructure and cybersecurity automation; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software for IT infrastructure and cybersecurity automation; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key(Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software for IT infrastructure and cybersecurity automation; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key;(Based on Intent to Use) Action figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys(Based on 44(d) Priority Application) Action figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys(Based on 44(e)) Action figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys;(Based on Intent to Use) Markers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Stickers(Based on 44(d) Priority Application) Markers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Stickers(Based on 44(e)) Markers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Stickers;(Based on Intent to Use) Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, private and secure electronic communications over a private or public computer network; Telecommunication access services(Based on 44(d) Priority Application) Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, private and secure electronic communications over a private or public computer network; Telecommunication access services(Based on 44(e)) Communication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, private and secure electronic communications over a private or public computer network; Telecommunication access services;(Based on Intent to Use) Installation, maintenance and repair of computer hardware; Technical support services, troubleshooting in the nature of the repair of computer hardware(Based on 44(d) Priority Application) Installation, maintenance and repair of computer hardware; Technical support services, troubleshooting in the nature of the repair of computer hardware(Based on 44(e)) Installation, maintenance and repair of computer hardware; Technical support services, troubleshooting in the nature of the repair of computer hardware;(Based on Intent to Use) Baseball caps and hats; Clothing, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear(Based on 44(d) Priority Application) Baseball caps and hats; Clothing, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear(Based on 44(e)) Baseball caps and hats; Clothing, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear;Color is not claimed as a feature of the mark.;(Based on Intent to Use) Business administration services; Business services, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software(Based on 44(d) Priority Application) Business administration services; Business services, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software(Based on 44(e)) Business administration services; Business services, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software;(Based on Intent to Use) Providing information on the development of privacy, security and data governance law via a website(Based on 44(d) Priority Application) Providing information on the development of privacy, security and data governance law via a website(Based on 44(e)) Providing information on the development of privacy, security and data governance law via a website;(Based on Intent to Use) Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty(Based on 44(d) Priority Application) Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty(Based on 44(e)) Drinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty;(Based on Intent to Use) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Software authoring; Technical support services, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity(Based on 44(d) Priority Application) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Software authoring; Technical support services, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity(Based on 44(e)) Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; Software authoring; Technical support services, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity;
Categories: BASED ON INTENT USE