UK Trademark Search > POLI-CERT

POLI-CERT United Kingdom Trademark Information

Risk management consultancy [business]; Advisory services relating to business risk management; Processing of administrative and security data and for managing security incidents; Public awareness campaigns relating to all aspects of computer security in the context of business; Market reports and studies; Collection, study and analysis of indicators for the prevention of potential cyber attacks; Business analysis, providing of information; Business support, administrative management and services; Compilation of statistics; Information (business —); Management of business projects [for others]; Business auditing, business auditing; Marketing research, consulting and analysis; research, consulting and strategic planning services in the field of business; Business consulting; Computerized file management.Insurance consultancy; Insurance claim assessments and financial risk assessment; provision of financial transaction processing services by electronic means, and monitoring of financial transactions; provision of financial management services, namely, electronic delivery, transfer, and processing of payments, funds, transactions and information through the use of the Internet; fin...

Words that describe this mark

risk   management   consultancy   business   advisory   services   relating   business   risk   management   processing   administrative   security   data   managing   security   incidents   public   awareness   campaigns   relating   aspects   security   context   business   market   reports   studies   collection     study   analysis   indicators   prevention   potential   cyber   attacks  
On Sunday, September 26, 2021, a united kingdom trademark registration was filed for POLI-CERT by Istituto Poligrafico e Zecca dello Stato S.p.A. (in breve IPZS S.p.A.) ********, ********, ***** ****. The United Kingdom IP office has given the trademark application number of UK00003701662. The current status of this trademark filing is Registered. The correspondent listed for POLI-CERT is Appleyard Lees IP LLP of ********, ********, ***** **** The POLI-CERT trademark is filed in the category of Advertising, Business & Retail Services , Insurance & Financial Services , Communications Services , Education and Entertainment Services , Computer & Software Services & Scientific Services , Personal & Legal & Social Services , Computer & Software Products & Electrical & Scientific Products .
Word Mark: POLI-CERT
Current Status:
Registered
LIVE (Circa: 2021)
Application Number: UK00003701662
Filing Date: Sunday, September 26, 2021
Registration Date: Friday, February 25, 2022
Type of Mark: Individual
Mark Feature: Word
Publication:
2021/050: Friday, December 10, 2021
Last Applicant/Owner: ********
********
***** ****
Correspondent:
********
********
***** ****

Classification Information

Class Description: 035 - Advertising, Business & Retail Services
Goods & Services: Risk management consultancy [business]; Advisory services relating to business risk management; Processing of administrative and security data and for managing security incidents; Public awareness campaigns relating to all aspects of computer security in the context of business; Market reports and studies; Collection, study and analysis of indicators for the prevention of potential cyber attacks; Business analysis, providing of information; Business support, administrative management and services; Compilation of statistics; Information (business —); Management of business projects [for others]; Business auditing, business auditing; Marketing research, consulting and analysis; research, consulting and strategic planning services in the field of business; Business consulting; Computerized file management.
Class Description: 036 - Insurance & Financial Services
Goods & Services: Insurance consultancy; Insurance claim assessments and financial risk assessment; provision of financial transaction processing services by electronic means, and monitoring of financial transactions; provision of financial management services, namely, electronic delivery, transfer, and processing of payments, funds, transactions and information through the use of the Internet; financial services, namely, online sale and purchase transactions, security, authorisation authentication, identification, validation, and verification services; all of the aforesaid services relevant to the field of digital security, cyber security, Internet security, data security and network security.
Class Description: 038 - Communications Services
Goods & Services: Communication of information by electronic means; Sharing of information resulting from risk analysis with accredited entities/organisations; Computer communication and Internet access; Broadcasting services; Telephone and mobile telephone services; Provision and rental of telecommunications facilities and equipment; Provision of broadband telecommunications access; Communications via multinational telecommunication networks; Mobile radio communications; Provision of communications via radio; Telematic communications via computer terminals; Communications by telegrams; Communications by telephone; Communications by television for meeting; Communications by telegraph; Communication by radio; Communication by hertzian wave; Communication of information by satellite; Data communication by electronic means; Communication of data by means of telecommunications; Communication by electronic means; Transfer of information by radio; Communication network consultancy; Professional consultancy relating to telecommunications; Telecommunications consultancy; Electronic communications consultancy; Providing of access to telecommunication warehousing services; Providing electronic telecommunication connections; Provision of information relating to media communications; Provision of communications facilities for the interchange of digital data; Providing facilities and equipment for video conferencing; Supply of airtime for communication services; Providing access to telecommunication networks; Operation of a telecommunications network; Operation of telecommunications systems; Wire agency [communication] services; Information relating to communications; Information about telecommunication; Electronic network communications; Retransmission of images via satellite; Relaying of television programmes by extra-terrestrial satellite; Virtual chatrooms established via text messaging; Audiovisual communication services; News agency services; News agency services for electronic transmission; News agency services for telecommunications; News agency services [transmission of news]; Providing high speed access to computer and communication networks; Telecommunications access services; Advisory services relating to communications equipment; Electronic communications services relating to credit card authorization; Wireless communications services; Communication services for the delivery of emergency messages; Communications services for the exchange of data in electronic form; Communication services for the electronic transmission of data; Communication services for the electronic transmission of images; Wide band radio communication services; Narrowband radio communication services; Radio frequency communications services; Radio telephone communication services; Teleprinter communication services; Communication services provided electronically; Information services relating to telecommunications; Information services relating to electronic communication networks; Providing access to electronic communications networks and electronic databases; Message sending and receiving services; Message sending services; Telecommunications routing and junction services; Information, consultancy and advisory services relating to telecommunications; Consultancy services relating to data communications; Consultancy in the field of telecommunications; Consulting services in the field of electronic communications; Network conferencing services; Provision of telecommunications connections for telephone chat lines; Telecommunications services, namely, personal communication services; Communication services by satellite; Telecommunications services using cellular radio networks; Telecommunications services provided by means of optical fibre networks; Telecommunications services for aircraft passengers; Telecommunications services to obtain information from data banks; Optical fibre telecommunications services; Telegraph telecommunications services; Telecommunications services between financial institutions; Telecommunications services between computer networks; Interactive telecommunications services; Telecommunications services for the distribution of data; Air to ground telecommunications services; Video uploading services; Photo uploading services; Mobile telecommunication network services; Radio communication network services; Interactive broadcasting and communications services; Maritime radio-telephone network services; Radio-facsimile services; Message services; On-line information services relating to telecommunications; Radio information services; Information and advisory services relating to telecommunication services; Video communication services; Telex services; Data transmission and reception services via telecommunication means; Secure transmission of data, sound or images; Electronic and telecommunication transmission services; Digital transmission services for audio and video data; Electronic transmission of voices (Services for the -); Digital transmission services; Television screen based text transmission services; Voice and data transmission services; Video transmission services; Information transmission services via digital networks; Ticker tape services; Telematics services accessible by password; Transmission of data by teletypewriter; Time sharing services for communications apparatus; Data transmission services over telecommunications networks; Data transmission services over telematic networks; High bit-rate data transmission services for telecommunication network operators; Teleconferencing and video conferencing services; Telecommunications services provided via fiber optic, wireless and cable networks; Telecommunications services for facsimile transmission of information; Telecommunications services for typesetting; Digital network telecommunications services; Fixed line telecommunication services; Transmission of data, messages and information; Transmission of data by teletypewriter; Transmission of data by laser beam; Transmission of data by microwave; Data transmission; Transmission of audio and video content via satellite; Transmission of encrypted communications; Transfer of data by telecommunications.
Class Description: 041 - Education and Entertainment Services
Goods & Services: Providing of training and awareness relating to computer security, in particular in the context of business; Educational and training programs in the field of risk management; Technical training relating to business and industrial risks; Arranging and conducting of congresses; Organisation of seminars; Provision of training courses; Teaching; Practical training [demonstration]; Know-how transfer [training]; Workshops for training purposes; Educational and teaching services; Conducting of seminars and congresses; Arranging and conducting of conferences; Coaching [training]; Educational instruction; Tutoring; Training; Arranging and conducting of in-person educational forums; Training; Education and instruction.
Class Description: 042 - Computer & Software Services & Scientific Services
Goods & Services: Scientific risk assessment; Provision of computer security risk management programs; Updating of computer software relating to computer security and prevention of computer risks; Maintenance of computer software relating to computer security and prevention of computer risks; Science and technology services; Testing, authentication and quality control; Software development, programming and implementation; IT consultancy, advisory and information services; Software as a service (SaaS); Platform as a service [PaaS]; Design services; Providing of artificial intelligence computer programs on data networks; Data security consultancy; Computer security threat analysis for protecting data; Design and development of electronic data security systems; Computer system design and development; Comparative analysis studies of the efficiency of computer systems; Providing information on computer technology and programming via a web site; Data security services [firewalls]; Computer virus protection services; Creating and designing website-based indexes of information for others [information technology services]; Technical research; Software as a service [SaaS]; Monitoring of computer systems for detecting unauthorized access or data breach; Computer software consultancy; Computer system analysis; Design of information systems; Data security services; IT security, protection and restoration; Development of computer platforms; Monitoring of computer systems by remote access; Consultancy in the field of computers; Technological consultancy; Computer system monitoring services; Information technology [IT] consultancy; Internet security consultancy; Research in the field of telecommunications technology; Consultancy in the design and development of computer hardware; Telecommunications technology consultancy; Web site design consultancy; Computer programming; Computer system design; Monitoring of computer systems to detect breakdowns; Providing of online non-downloadable internet security software; Consultancy for others in computer forensics; Consultancy for others relating to internet security hardware and software; Computer security consultancy for others relating to the prevention of unauthorised access to computers and electronics systems; Design, development, implementation of and advice on computer software and software as a service (SaaS) featuring software for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording user sessions; Design, development, implementation of and advice on computer software for detecting suspicious or malicious user activity and cyber threats; Design, development, implementation of and advice on computer software and software as a service (SaaS) featuring software for transparently removing local administrator rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface; Design, development, implementation of and advice on computer software for mitigating the risk of a data breach, to block and contain advanced persistent threat attacks at the endpoint, for helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; Design, development, implementation of and advice on computer software for protecting, securing, managing and inspecting credentials and secrets used by computer programs, automation scripts and other machine and non-human identities in order to securely access databases; Design, development, implementation of and advice on web services and other resources required to execute computing functions and for the providing of services, including widely-used applications of all kinds and non-human identities including software of others already on the market, internally-developed software applications, automation scripts, placed in containers, on the cloud, SaaS, PaaS, hybrids, mainframes and other software components, solutions and computing environments; Design, development, implementation of and advice on computer software and software as a service (SaaS) featuring software for enabling secure application access over computer networks and over the internet, for protecting user identity using multi-factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access; IT services for providing biometric user authentication using biometric technology, hardware and software, and for accounts management of others and related session activity monitoring; Design, development, implementation, updating and strategic planning services of computer software for digital security, cyber security, cyber risk management; data breach response and crisis management; Internet security, data security and network security; Provision of information relating to information technology; provision of information and data relating to digital security, cyber security, cyber risk management, data breach response and crisis management, Internet security, data security and network security; assessment of, and analytical services relating to, digital security, cyber security, cyber risk management, data breach response and crisis management, Internet security, data security and network security; compliance auditing, assessment and reporting, in relation to digital security, cyber security, cyber risk management, data breach response and crisis management, Internet security, data security and network security; Computer security consultancy; research into new computer and Internet security threats; computer and Internet virus protection services; technical support services for the use of computer software in the field of Internet security; Recovery of computer data; technical support, advice and consulting services related to security and vulnerability to cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support, advice and consulting services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services utilising software and databases for use in computer security and prevention, and the mitigation of cyber risks; providing temporary use of on-line nondownloadable cloud computing software for computer network security; Research and consulting services In the field of computer hardware and software, relating to digital security and cybersecurity; consultation and research in the field of network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; providing information technology security services, namely, cyber-threat intelligence services, cyber-attack verification services, and security analysis of network traffic, emails, files, media computer software, and mobile applications; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments; providing information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices and generally in the field of information technology security and vulnerability; Installation and maintenance of computer programs, relating to internet security; IT services, relating to the providing of an IT computer software platform, for browsing the internet via website security authentication, in the field of businesses and/or services, namely banking and electronic commerce; IT services enabling users to have more trust in accessing the internet, via independent verification of internet browsers and feedback relating to website owner authenticity; IT services for protection against browser-based attacks and other internet security vulnerabilities, online fraud, via a subscription service enabling internet users to check the identification status and authentication logo of website owners unobtrusively and in real time; notification and delivery of Internet security software updates; Monitoring of computer systems for security purposes; Software application services, Relating to the providing of online non-downloadable computer software for computer security control, in relation to Internet security; Hosting web sites; computer Internet security services, namely, providing authentication, verification and validity of website identity; the issuance and management of digital secure online identification in the form of a digital authentication window, for authentication verification of a website or digital communication, or authentication of a website proprietor's digital signature and/or logo in an electronic communication and/or transaction over the Internet; IT services, namely, secure online website authentication identification software subscription services for website owners enabling internet users to check the online identification of website owners in real time; computer services, namely, the provision of online digital identification authentication, and design, development, production, implementation, testing, analysis, maintenance and consultation services for Internet security, encryption, access, authorisation, authentication verification and identification systems for computers, computer software, and/or hardware, and/or networks; Enterprise software integration; research, development, integration and operation of computer systems supporting the issuance and management of digital secure online website authentication verification, and the creation and implementation of procedures and practices for the issuance and management of digital online website authentication verification; computer related services, namely, Internet security services, being for use in secure online verification, authentication, identification, and management; technical and customer support for entities using digital online website authentication verification, and, online technical support services in relation to the aforesaid, namely, troubleshooting of computer software and hardware problems, and providing back-up computer programs and facilities; creation, organisation and maintenance of information knowledge bases in the field of Internet security; provision of technical information services in the field of Internet security software applications; dissemination and provision of information in the field of Internet security, data storage, prevention of Internet security vulnerabilities, computer viruses, computer software and hardware design, applications in security and maintenance; Consultancy relating to IT security and data security; Research services.
Class Description: 045 - Personal & Legal & Social Services
Goods & Services: Health and safety risk management; Health and safety risk assessment services; Regulatory compliance consultancy in the field of data security; Analytics relating to IT and data security.
Class Description: 009 - Computer & Software Products & Electrical & Scientific Products
Goods & Services: Risk detection software; Operational risk management software; Artificial intelligence and machine learning software; Utility, security and cryptography software; Electronic security bulletins for businesses; Databases; Computer software to automate data warehousing; Computer software for backup and recovery of databases and servers; computer software for database imaging, server imaging, and disk imaging; computer software for snapshot generation, backup, and disaster recovery; computer software for server backup and recovery, including server recovery via server migration by restoration to a server instance on a different physical machine; Downloadable computer software for using, sharing and storing sensitive information over an enterprise computer networks and over the internet, for protecting, monitoring and detecting privileged access, accounts and activity, for initiating, monitoring, and recording sessions of users, for detecting suspicious or malicious user activity and cyber-related threats; Downloadable computer software for transparently removing local administrator rights through least privilege management, just-in-time access and elevation, advanced credential theft protection and application control in order to reduce the attack surface, mitigate the risk of a data breach, block and contain advanced persistent threat attacks at the endpoint; Downloadable computer software for helping to prevent lateral movement within the network and information from being stolen or encrypted then held for ransom; Downloadable computer software for protecting, securing, managing and inspecting credentials and secrets used by computer programs, automation scripts and other machine and non-human identities in order to securely access databases, web services and other resources required to execute computing functions; Downloadable computer software for providing services, including widely-used applications of all kinds and non-human identities, including software of others already on the market, internally-developed software applications, automation scripts, placed in containers, on the cloud, SaaS, PaaS, hybrids, mainframes and other software components, solutions and computing environments; Downloadable computer software for enabling secure application access over computer networks and over the internet, for protecting user identity using multi-factor authentication, establishing secure just-in-time access to designated computing resources, monitoring and detecting privileged access; Downloadable computer software for providing biometric user authentication using biometric technology, hardware and software, and for accounts management of others and related session activity monitoring; Downloadable electronic computer manuals distributed with the aforesaid; Computer software and hardware for digital security, cyber security, Internet security, data security and network security; Computer security products, namely, peripherals designed for use with computers; computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; Computer software and computer hardware for detection, blocking, monitoring, filtering, reporting and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, advanced persistent threats, network traffic, malware, spyware, unauthorised software and network attacks; Computer software for preventing intrusion into computer networks, websites, and other computer systems, and related computer hardware, and for security, configuration auditing, and vulnerability scanning of computer networks; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; software for cryptographic network and data security functions, namely, browser independent verification and validation of website authenticity allowing protection from browser based computer software and hardware hacking and online fraud, via online identification authentication of website proprietors in real-time; computers and/or computer programmes, data processing apparatus and/or instruments, adapted for use in independently verifying and validating the authenticity of websites; computer software for analysis and reporting of computer firewall log data; computer software for automating a process for secure authentication of website identity; Internet security software, namely, to provide security in electronic transactions and communications that take place over the Internet; software for secure protection against Internet security vulnerabilities, namely, web based security software for antiphishing, anti-pharming, anti-DNS Poisoning, anti-man in the middle attacks, anti- frame spoofing, anti-MD5, anti-virus, anti-spyware, anti-adware, anti-spam; web based software for security, namely, transaction security against online fraud, intrusion prevention and detection, content filtering software, privacy, namely, privacy control software; security encryption software for use in the secure transmission of digital information in the field of banking and/or e-commerce, over the Internet, namely, confidential information, financial information, credit and/or debit card information; software for the integration of managed security services, namely, the issuance of digital online website authentication verification, and/or enterprise security software integration, with existing communications networks, software and services; Software, namely, protocol conversion software for translating messages and/or information between telecommunications protocols and/or languages; Electronic publications, downloadable.
Trademarkia is the largest search engine for U.S., China, European Union, Canada, Australia, and United Kingdom Trademarks. Each month hundreds of trademarks around the world are filed by licensed attorneys in the Trademarkia network! You can register your trademark in 180+ countries in the world through Trademarkia Network. Trademarkia.com is a free search engine of publicly available government records. Trademarkia.com is not a law firm and does not represent owners & correspondents listed on this page.

100% Satisfaction Guarantee protect your valuable brand now.

  • 1. LegalForce - #1 Trademark Filing since 2010.
  • 2. Describe how your business or product is being used. Register your mark in 180+ countries.
  • 1. Top Global Specialist - Credibility and Experience!
  • 2. All processes will be performed in a timely manner. You will be informed periodically about the process.

What our customers say:

testimonial

I wasn't too sure what to expect when taking up services, but the professionalism from the site to the customer service is the slickest I have ever experienced.

Camryn, Surrey, UK
What You Can Do:
Trademarkia lets you see how your personal name, product name, trademark name or username is being used on any of 530+ new and popular social networks. Be the first to reserve your name and get help stopping others from using it - all in one place!