COFENSE

COFENSE Canadian Trademark Information

Computer software used to maintain security over and in computer networks, web applications and digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information and deliver malware and other unauthorized software, data and pro...
Classification Information
Class Code: 042 - Computer & Software Services & Scientific Services
Description: Computer and scientific
Class Code: 009 - Computer & Software Products & Electrical & Scientific Products
Description: Electrical, scientific and teaching apparatus and software
Matter History Events
Status Date Record Status Description
2020-01-06 Registration published - Registered
2020-01-01 Application published - Registration Pending
2020-01-01 National prosecution history entry - Registration Fee Notice Sent
2019-10-09 Application published - Advertised
2019-09-23 National prosecution history entry - Search Recorded
2019-09-23 National prosecution history entry - Approval Notice Sent
2019-09-23 Application accepted - Approved
2018-03-27 Filing date accorded - Formalized
2018-03-21 National prosecution history entry - Created
2018-03-20 Application filed - Filed
Word Mark: COFENSE
Current Status:
Registration published
LIVE Mark!
1/6/2020
Application Number: 1889160
Filing Date: Tuesday, March 20, 2018
Filing Place: Canada
Registration Date: Monday, January 6, 2020
Registration Number: TMA1068077
Register Type: Primary
Type Of Mark: Trademark
Mark Feature: Word
Use In Commerce: Yes
Publication Registration: Wednesday, October 9, 2019
Opposition: 10/9/2019 - 10/9/2019
Last Applicant/Owner: *********
**********
***** ****
Correspondent: Not provided
Goods and Services Information
Description:
(1) - Computer software used to maintain security over and in computer networks, web applications and digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs for information systems security education and training; computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management
(2) - Software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over and in computer networks, web applications and digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; application service provider featuring application programming interface (API) software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; online computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management
(3) - Computer software used to maintain security over and in computer networks, web applications and digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs for information systems security education and training; computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management
(4) - Computer software used to maintain security over and in computer networks, web applications and digital data; computer software for providing network, Internet, and computer security; computer software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; computer software for emulating attack methods used by computer hackers; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs; computer software for computer security risk and threat analysis, assessment, and management; computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs for information systems security education and training; computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management
(5) - Software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over and in computer networks, web applications and digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; application service provider featuring application programming interface (API) software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; online computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management
(6) - Software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over and in computer networks, web applications and digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; application service provider featuring application programming interface (API) software for providing security, anti-virus scanning, detection, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; online computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, servers and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information and deliver malware and other unauthorized software, data and programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management
Trademarkia is the largest search engine for U.S., China, European Union, Canada, and Australia Trademarks. Each month hundreds of trademarks around the world are filed by licensed attorneys in the Trademarkia network law firms! You can register your trademark in 180+ countries in the world through Trademarkia Network. Trademarkia.com is a free search engine of publicly available government records. Trademarkia.com is not a law firm and does not represent owners & correspondents listed on this page.
What You Can Do:
Trademarkia lets you see how your personal name, product name, trademark name or username is being used on any of 530+ new and popular social networks. Be the first to reserve your name and get help stopping others from using it - all in one place!
As seen on