About 571 Trademarks found for “NORD*”
Filters
Also try searching for:
*ORD
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
Nord Security NordSec B.V. 2163789 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | ||
NordWL NordSec B.V. 2163791 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | ||
Nord NordSec B.V. 2163793 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | ||
NordPass NordSec B.V. 2163794 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | ||
NordLayer NordSec B.V. 2171435 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | ||
NordSec NordSec B.V. 2163790 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | ||
![]() | NORD SECURITY NordSec B.V. 2163792 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | |
NordLocker NordSec B.V. 2163795 29 Sept 2021 | APPROVED on 27 May 2025 | Scientific, research, navigation, surveying, photographic, cinematogra... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites. Class 038 Class 038 Communications Services Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. ... Class 042 Computer & Software Services & Scientific Services Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid. Class 045 Personal & Legal & Social Services Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy. | ||
![]() | NORDIC FLAME & Design MACVAD LTD. 2134946 22 Sept 2021 | SEARCHED on 31 Dec 2024 | Fireplace tools, namely, fireplace pokers, fireplace tongs, fireplace ... Class 008 Class 008 Hand Tool Products Fireplace tools, namely, fireplace pokers, fireplace tongs, fireplace shovels, fireplace bellows. Class 011 Class 011 Environmental Control Instrument Products lighting heating cooling cooking Barbecues, grills, barbecue smokers, portable fireplaces, patio heaters, electric space heaters, pizza ovens. ... Class 021 Houseware and Glass Products Barbecue covers, barbecue tools, namely, barbecue forks, barbecue tongs. | |
NORDSUN NORDSUN GMBH 2156031 8 Sept 2021 | REGISTERED on 6 Sept 2024 | Beer, ale and lager; non-alcoholic beverages, in particular mineral wa... Class 032 Class 032 Light Beverage Products Beer, ale and lager; non-alcoholic beverages, in particular mineral water Class 033 Class 033 Wines and Spirits Products Alcoholic beverages, except beer, namely, rum, vodka, brandy, gin, whisky and wines ... Class 039 Transportation & Storage Services Transport services, namely, transport and delivery of goods, namely, organization of freight transport by air, boat, rail, truck, shipping and delivery services namely, pickup, transportation, and delivery of packages and documents by truck, air, railway or ship, supply chain logistics and reverse logistic services, namely, delivery, transport and storage of goods and merchandise for others by air, rail, ship or truck, reservation and booking of transportation of goods by air, rail, ship, bus and truck, transport of freight and cargo, in particular, transportation of cargoes by air and sea, loading of cargo on ships, air transportation services for cargo, transportation of cargo by ship, international sea cargo shipping services, international air cargo transportation, cargo unloading services, organization of transportation of air cargo, organization of transportation of cargoes by water; travel services and transportation of passengers, namely, conducting and arranging of transportation for travel tours, air transportation of passengers, organization of transportation of passengers by ship, organization of transportation of passengers by air, rail and water, organization of cruises, reservation and booking of transportation for passengers, arranging of travel tours, booking of travel through tourist offices, booking of seats for travel, booking of tickets for air travel, arranging and book of excursions, ship cruises, organization of cruises, arranging and booking of sightseeing travel tours; organization and implementation of sightseeing tours, trips and excursions, organization, booking and arrangement of day trips, organization of excursions, day trips and sightseeing tours, arranging and booking of excursions; rental services related to transportation and location, namely, rental of means of transportation, namely, chartering of aircraft, rental of ships, rental of cars, rental of motorized land vehicles, aircraft rental, aircraft charter services, rental of barges, vessel fleet rental services, namely, rental of ships and boats, aircraft rental and leasing services, transportation vehicle rental services, provision of information on aircraft rental, provision of information on watercraft rental; renting of means of transport, in particular car rental services; organization of renting of vehicles, organization of renting of cars in the framework of package tours, renting of means of transportation, namely, renting of aircrafts, renting of land vehicles, renting of rental vehicles, renting of transport vehicles; information, consulting and reservation services related to transportation services, in particular car rental services, services related to the rental of ships, organization of vehicle rental, organization of car rental as part of package tours, renting of ships, renting of airplanes, renting of land vehicles, renting of rental vehicles, renting of transport vehicles, agency services related to the organization of travel, consulting services in the field of air transport, freight transportation consultation in the field of freight transportation by truck rail, air and ocean, providing information relating to ship transport, freight transportation brokerage, ship brokerage, travel agency services, namely making reservations and bookings for transportation, provision of advice for travel and travel by air, rail, ship and truck for leisure, recreation, tourism, holiday and vacation travel, freight broker services, organization and booking of cruises, organization and booking of excursions, planning, booking and organizing excursions, day trips and sightseeing travel tours, travel consultancy, ship brokerage services, freight brokerage services, providing information on air transportation, providing information on ship brokerage services, providing information on aircraft rental, providing information on sea transportation services; chartering of ships Class 041 Education and Entertainment Services Cargo ship simulation training services, training of pilots and cabin crew, training of ship crews; online electronic publishing of books, journals, newsletters, pamphlets and brochures in the field of cargo transportation Class 043 Restaurant and Hotel Services Temporary accommodation of guests, namely, accommodation of tourist and vacation guests in hotels, hostels and boarding houses, in particular accommodation services for travelers, operation of hotel facilities, operation of hotels and motels, operation of tourist hostels, providing agency services for booking vacation accommodation reservations, rental of hotel accommodation, arrangement of accommodation in vacation resorts, rental of banquet and social function facilities for special occasions, namely, wedding receptions, holiday parties, celebrations, corporate events and charity fundraisers, temporary office space and conference facilities; providing information, advisory and reservation services relating to the temporary accommodation of guests, in particular advisory services relating to hotel offers, advisory services relating to hotels, advisory services relating to the booking of hotel accommodation, travel agency services for the booking of hotel accommodation; providing information and advisory services relating to food and drink catering for others; arranging for catering services provided by others |
on 27 May 2025
NordSec B.V.
2163789 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 27 May 2025
NordSec B.V.
2163791 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 27 May 2025
NordSec B.V.
2163793 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 27 May 2025
NordSec B.V.
2163794 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 27 May 2025
NordSec B.V.
2171435 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 27 May 2025
NordSec B.V.
2163790 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 27 May 2025
NordSec B.V.
2163792 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 27 May 2025
NordSec B.V.
2163795 · 29 Sept 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.
038
Class 038
Communications Services
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
...
Class 042
Computer & Software Services & Scientific Services
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.
Class 045
Personal & Legal & Social Services
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.
Scientific, research, navigation, surveying, photographic, cinematogra...
on 31 Dec 2024
MACVAD LTD.
2134946 · 22 Sept 2021
008
Class 008
Hand Tool Products
Fireplace tools, namely, fireplace pokers, fireplace tongs, fireplace shovels, fireplace bellows.
011
Class 011
Environmental Control Instrument Products lighting heating cooling cooking
Barbecues, grills, barbecue smokers, portable fireplaces, patio heaters, electric space heaters, pizza ovens.
...
Class 021
Houseware and Glass Products
Barbecue covers, barbecue tools, namely, barbecue forks, barbecue tongs.
Fireplace tools, namely, fireplace pokers, fireplace tongs, fireplace ...
on 6 Sept 2024
NORDSUN GMBH
2156031 · 8 Sept 2021
032
Class 032
Light Beverage Products
Beer, ale and lager; non-alcoholic beverages, in particular mineral water
033
Class 033
Wines and Spirits Products
Alcoholic beverages, except beer, namely, rum, vodka, brandy, gin, whisky and wines
...
Class 039
Transportation & Storage Services
Transport services, namely, transport and delivery of goods, namely, organization of freight transport by air, boat, rail, truck, shipping and delivery services namely, pickup, transportation, and delivery of packages and documents by truck, air, railway or ship, supply chain logistics and reverse logistic services, namely, delivery, transport and storage of goods and merchandise for others by air, rail, ship or truck, reservation and booking of transportation of goods by air, rail, ship, bus and truck, transport of freight and cargo, in particular, transportation of cargoes by air and sea, loading of cargo on ships, air transportation services for cargo, transportation of cargo by ship, international sea cargo shipping services, international air cargo transportation, cargo unloading services, organization of transportation of air cargo, organization of transportation of cargoes by water; travel services and transportation of passengers, namely, conducting and arranging of transportation for travel tours, air transportation of passengers, organization of transportation of passengers by ship, organization of transportation of passengers by air, rail and water, organization of cruises, reservation and booking of transportation for passengers, arranging of travel tours, booking of travel through tourist offices, booking of seats for travel, booking of tickets for air travel, arranging and book of excursions, ship cruises, organization of cruises, arranging and booking of sightseeing travel tours; organization and implementation of sightseeing tours, trips and excursions, organization, booking and arrangement of day trips, organization of excursions, day trips and sightseeing tours, arranging and booking of excursions; rental services related to transportation and location, namely, rental of means of transportation, namely, chartering of aircraft, rental of ships, rental of cars, rental of motorized land vehicles, aircraft rental, aircraft charter services, rental of barges, vessel fleet rental services, namely, rental of ships and boats, aircraft rental and leasing services, transportation vehicle rental services, provision of information on aircraft rental, provision of information on watercraft rental; renting of means of transport, in particular car rental services; organization of renting of vehicles, organization of renting of cars in the framework of package tours, renting of means of transportation, namely, renting of aircrafts, renting of land vehicles, renting of rental vehicles, renting of transport vehicles; information, consulting and reservation services related to transportation services, in particular car rental services, services related to the rental of ships, organization of vehicle rental, organization of car rental as part of package tours, renting of ships, renting of airplanes, renting of land vehicles, renting of rental vehicles, renting of transport vehicles, agency services related to the organization of travel, consulting services in the field of air transport, freight transportation consultation in the field of freight transportation by truck rail, air and ocean, providing information relating to ship transport, freight transportation brokerage, ship brokerage, travel agency services, namely making reservations and bookings for transportation, provision of advice for travel and travel by air, rail, ship and truck for leisure, recreation, tourism, holiday and vacation travel, freight broker services, organization and booking of cruises, organization and booking of excursions, planning, booking and organizing excursions, day trips and sightseeing travel tours, travel consultancy, ship brokerage services, freight brokerage services, providing information on air transportation, providing information on ship brokerage services, providing information on aircraft rental, providing information on sea transportation services; chartering of ships
Class 041
Education and Entertainment Services
Cargo ship simulation training services, training of pilots and cabin crew, training of ship crews; online electronic publishing of books, journals, newsletters, pamphlets and brochures in the field of cargo transportation
Class 043
Restaurant and Hotel Services
Temporary accommodation of guests, namely, accommodation of tourist and vacation guests in hotels, hostels and boarding houses, in particular accommodation services for travelers, operation of hotel facilities, operation of hotels and motels, operation of tourist hostels, providing agency services for booking vacation accommodation reservations, rental of hotel accommodation, arrangement of accommodation in vacation resorts, rental of banquet and social function facilities for special occasions, namely, wedding receptions, holiday parties, celebrations, corporate events and charity fundraisers, temporary office space and conference facilities; providing information, advisory and reservation services relating to the temporary accommodation of guests, in particular advisory services relating to hotel offers, advisory services relating to hotels, advisory services relating to the booking of hotel accommodation, travel agency services for the booking of hotel accommodation; providing information and advisory services relating to food and drink catering for others; arranging for catering services provided by others
Beer, ale and lager; non-alcoholic beverages, in particular mineral wa...
Owners
Nordsec b.V. (13)
Les chantiers de chibougamau ltée (9)
Nordictrack inc. (9)
Nihc, inc. (8)
Nokian tyres plc (8)
Novo nordisk health care ag (7)
Tecnica group s.P.A. (7)
Nordic group b.V. (6)
Nihc inc. (a colorado corporation) (5)
Nordic lights oy (5)
Categories
Class 9 (101)
Class 35 (99)
Class 25 (69)
Class 42 (66)
Class 5 (60)
Class 11 (59)
Class 7 (53)
Class 12 (52)
Class 6 (47)
Class 28 (43)
Class 20 (42)
Class 37 (39)
Class 3 (37)
Class 30 (37)
Class 41 (37)
Class 21 (35)
Class 16 (34)
Class 24 (34)
Class 29 (33)
Class 19 (32)
Class 32 (28)
Class 18 (27)
Class 38 (25)
Class 8 (24)
Class 39 (24)
Class 14 (23)
Class 40 (21)
Class 1 (20)
Class 17 (20)
Class 36 (19)
Class 45 (19)
Class 34 (18)
Class 4 (16)
Class 10 (16)
Class 44 (16)
Class 22 (14)
Class 31 (14)
Class 43 (13)
Class 33 (12)
Class 2 (9)
Class 26 (6)
Class 15 (5)
Class 13 (4)
Class 27 (4)
Class 23 (3)
Correspondents
Smart & biggar lp (92)
Gowling wlg (canada) llp (48)
Robic agence pi s.E.C./ robic ip agency lp (22)
Clark wilson llp (20)
Fasken martineau dumoulin llp (16)
Marks & clerk (16)
Bcf s.E.N.C.R.L./bcf llp (15)
Borden ladner gervais llp (14)
Perley-robertson, hill & mcdougall llp (11)
Apply for Trademark
Select countries to protect your logo Trademark
Trademark Name
Country Selected
Canada
C$474/ 1 class + gov fee
United States
C$136/ 1 class + gov fee
Canada
C$474/ 1 class + gov fee
Mexico
C$685/ 1 class + gov fee
European Union
C$960/ 1 class + gov fee
China
C$685/ 1 class + gov fee
South Korea
C$959/ 1 class + gov fee
Japan
C$1,096/ 1 class + gov fee
India
C$342/ 1 class + gov fee
United Kingdom
C$685/ 1 class + gov fee
Australia
C$411/ 1 class + gov fee
Israel
C$959/ 1 class + gov fee
United Arab Emirates
C$959/ 1 class + gov fee
New Zealand
C$548/ 1 class + gov fee
Brazil
C$685/ 1 class + gov fee
Taiwan
C$1,096/ 1 class + gov fee
Ukraine
C$1,096/ 1 class + gov fee
Indonesia
C$959/ 1 class + gov fee
South Africa
C$685/ 1 class + gov fee
Singapore
C$1,096/ 1 class + gov fee
Saudi Arabia
C$1,096/ 1 class + gov fee
Afghanistan
C$1,096/ 1 class + gov fee
Algeria
C$1,096/ 1 class + gov fee
Argentina
C$548/ 1 class + gov fee
Austria
C$1,233/ 1 class + gov fee
Bahrain
C$959/ 1 class + gov fee
Bangladesh
C$822/ 1 class + gov fee
Benelux
C$1,370/ 1 class + gov fee
Bhutan
C$1,233/ 1 class + gov fee
Bolivia
C$1,096/ 1 class + gov fee
Botswana
C$1,782/ 1 class + gov fee
British Virgin Islands
C$1,645/ 1 class + gov fee
Bulgaria
C$1,096/ 1 class + gov fee
Cambodia
C$1,096/ 1 class + gov fee
Chile
C$685/ 1 class + gov fee
Colombia
C$959/ 1 class + gov fee
Congo
C$1,645/ 1 class + gov fee
Costa Rica
C$1,233/ 1 class + gov fee
Croatia
C$1,233/ 1 class + gov fee
Cyprus
C$1,370/ 1 class + gov fee
Czech Republic
C$1,233/ 1 class + gov fee
Denmark
C$1,096/ 1 class + gov fee
Macau
C$959/ 1 class + gov fee
Greenland
C$1,096/ 1 class + gov fee
Dominican Republic
C$1,233/ 1 class + gov fee
Curacao
C$1,645/ 1 class + gov fee
Aruba
C$1,645/ 1 class + gov fee
Ecuador
C$1,096/ 1 class + gov fee
Egypt
C$959/ 1 class + gov fee
El Salvador
C$1,096/ 1 class + gov fee
Ethiopia
C$1,508/ 1 class + gov fee
France
C$1,233/ 1 class + gov fee
Gaza
C$1,096/ 1 class + gov fee
Germany
C$1,233/ 1 class + gov fee
Greece
C$1,096/ 1 class + gov fee
Guatemala
C$1,233/ 1 class + gov fee
Haiti
C$1,233/ 1 class + gov fee
Honduras
C$1,233/ 1 class + gov fee
Hong Kong (SAR)
C$1,233/ 1 class + gov fee
Hungary
C$1,508/ 1 class + gov fee
Iraq
C$2,056/ 1 class + gov fee
Italy
C$1,233/ 1 class + gov fee
Jordan
C$1,096/ 1 class + gov fee
Kazakhstan
C$1,096/ 1 class + gov fee
Kenya
C$1,233/ 1 class + gov fee
Kuwait
C$1,096/ 1 class + gov fee
Laos
C$959/ 1 class + gov fee
Lebanon
C$1,370/ 1 class + gov fee
Lesotho
C$1,645/ 1 class + gov fee
Libya
C$1,233/ 1 class + gov fee
Madrid Protocol (WIPO)
C$2,742/ 1 class + gov fee
Malawi
C$1,508/ 1 class + gov fee
Malaysia
C$959/ 1 class + gov fee
Maldives
C$1,370/ 1 class + gov fee
Morocco
C$1,370/ 1 class + gov fee
Mozambique
C$1,233/ 1 class + gov fee
Myanmar
C$1,096/ 1 class + gov fee
Namibia
C$1,096/ 1 class + gov fee
Nepal
C$959/ 1 class + gov fee
Nicaragua
C$1,233/ 1 class + gov fee
Norway
C$1,233/ 1 class + gov fee
Oman
C$1,508/ 1 class + gov fee
Pakistan
C$1,096/ 1 class + gov fee
Panama
C$1,233/ 1 class + gov fee
Paraguay
C$1,233/ 1 class + gov fee
Peru
C$1,096/ 1 class + gov fee
Philippines
C$1,233/ 1 class + gov fee
Poland
C$685/ 1 class + gov fee
Portugal
C$1,233/ 1 class + gov fee
Puerto Rico
C$1,233/ 1 class + gov fee
Qatar
C$1,096/ 1 class + gov fee
Romania
C$1,233/ 1 class + gov fee
Serbia
C$1,233/ 1 class + gov fee
Slovakia
C$1,233/ 1 class + gov fee
Spain
C$1,233/ 1 class + gov fee
Sri Lanka
C$959/ 1 class + gov fee
Swaziland
C$1,782/ 1 class + gov fee
Sweden
C$1,096/ 1 class + gov fee
Switzerland
C$1,233/ 1 class + gov fee
Thailand
C$1,096/ 1 class + gov fee
Tunisia
C$1,233/ 1 class + gov fee
Turkey
C$1,096/ 1 class + gov fee
Uganda
C$959/ 1 class + gov fee
United Republic of Tanzania
C$959/ 1 class + gov fee
Uruguay
C$1,096/ 1 class + gov fee
Venezuela
C$1,233/ 1 class + gov fee
Vietnam
C$1,096/ 1 class + gov fee
West Bank, Palestine
C$1,096/ 1 class + gov fee
Yemen
C$2,330/ 1 class + gov fee
Albania
C$1,233/ 1 class + gov fee
Andorra
C$1,233/ 1 class + gov fee
Angola
C$1,782/ 1 class + gov fee
Antigua and Barbuda
C$1,645/ 1 class + gov fee
Armenia
C$1,096/ 1 class + gov fee
Azerbaijan
C$1,096/ 1 class + gov fee
Bahamas
C$1,919/ 1 class + gov fee
Barbados
C$1,782/ 1 class + gov fee
Belgium
C$1,370/ 1 class + gov fee
Belize
C$1,782/ 1 class + gov fee
Benin
C$1,096/ 1 class + gov fee
Bosnia and Herzegovina
C$1,370/ 1 class + gov fee
Brunei
C$1,782/ 1 class + gov fee
Burkina Faso
C$1,096/ 1 class + gov fee
Burundi
C$1,645/ 1 class + gov fee
Cabo Verde
C$1,233/ 1 class + gov fee
Cameroon
C$1,096/ 1 class + gov fee
Central African Republic (CAR)
C$1,096/ 1 class + gov fee
Chad
C$1,096/ 1 class + gov fee
Comoros
C$1,096/ 1 class + gov fee
Cote d'Ivoire
C$1,096/ 1 class + gov fee
Czechia
C$1,370/ 1 class + gov fee
Djibouti
C$1,645/ 1 class + gov fee
Dominica
C$1,782/ 1 class + gov fee
Equatorial Guinea
C$1,096/ 1 class + gov fee
Eritrea
C$1,370/ 1 class + gov fee
Estonia
C$1,782/ 1 class + gov fee
Eswatini
C$1,782/ 1 class + gov fee
Fiji
C$1,233/ 1 class + gov fee
Finland
C$959/ 1 class + gov fee
Gabon
C$1,096/ 1 class + gov fee
Gambia
C$1,233/ 1 class + gov fee
Georgia
C$1,096/ 1 class + gov fee
Ghana
C$1,370/ 1 class + gov fee
Grenada
C$1,782/ 1 class + gov fee
Guinea
C$1,096/ 1 class + gov fee
Guinea-Bissau
C$1,096/ 1 class + gov fee
Guyana
C$1,782/ 1 class + gov fee
Iceland
C$1,782/ 1 class + gov fee
Ireland
C$1,096/ 1 class + gov fee
Jamaica
C$1,645/ 1 class + gov fee
Kiribati
C$1,370/ 1 class + gov fee
Kosovo
C$1,233/ 1 class + gov fee
Kyrgyzstan
C$1,233/ 1 class + gov fee
Latvia
C$959/ 1 class + gov fee
Liberia
C$1,370/ 1 class + gov fee
Liechtenstein
C$1,370/ 1 class + gov fee
Lithuania
C$959/ 1 class + gov fee
Luxembourg
C$1,370/ 1 class + gov fee
Madagascar
C$1,370/ 1 class + gov fee
Mali
C$1,096/ 1 class + gov fee
Malta
C$822/ 1 class + gov fee
Marshall Islands
C$1,370/ 1 class + gov fee
Mauritania
C$1,096/ 1 class + gov fee
Mauritius
C$1,370/ 1 class + gov fee
Micronesia
C$1,370/ 1 class + gov fee
Moldova
C$1,370/ 1 class + gov fee
Monaco
C$1,919/ 1 class + gov fee
Mongolia
C$822/ 1 class + gov fee
Montenegro
C$1,233/ 1 class + gov fee
Nauru
C$1,370/ 1 class + gov fee
Netherlands
C$1,370/ 1 class + gov fee
Niger
C$1,096/ 1 class + gov fee
Nigeria
C$548/ 1 class + gov fee
North Macedonia
C$1,233/ 1 class + gov fee
Palau
C$1,370/ 1 class + gov fee
Palestine
C$1,370/ 1 class + gov fee
Papua New Guinea
C$1,096/ 1 class + gov fee
Rwanda
C$1,370/ 1 class + gov fee
Saint Kitts and Nevis
C$1,782/ 1 class + gov fee
Saint Lucia
C$1,782/ 1 class + gov fee
Saint Vincent and the Grenadines
C$1,782/ 1 class + gov fee
Samoa
C$1,645/ 1 class + gov fee
San Marino
C$1,370/ 1 class + gov fee
Sao Tome and Principe
C$1,370/ 1 class + gov fee
Senegal
C$1,096/ 1 class + gov fee
Seychelles
C$1,370/ 1 class + gov fee
Sierra Leone
C$1,370/ 1 class + gov fee
Slovenia
C$1,233/ 1 class + gov fee
Solomon Islands
C$1,370/ 1 class + gov fee
Somalia
C$1,370/ 1 class + gov fee
South Sudan
C$1,370/ 1 class + gov fee
Suriname
C$2,193/ 1 class + gov fee
Tajikistan
C$1,096/ 1 class + gov fee
Tanzania
C$959/ 1 class + gov fee
Timor-Leste
C$1,370/ 1 class + gov fee
Togo
C$1,096/ 1 class + gov fee
Tonga
C$1,782/ 1 class + gov fee
Trinidad and Tobago
C$1,645/ 1 class + gov fee
Turkmenistan
C$1,096/ 1 class + gov fee
Tuvalu
C$1,370/ 1 class + gov fee
Uzbekistan
C$959/ 1 class + gov fee
Vanuatu
C$1,645/ 1 class + gov fee
Zambia
C$1,233/ 1 class + gov fee
Zimbabwe
C$1,233/ 1 class + gov fee
OAPI
C$1,233/ 1 class + gov fee
ARIPO
C$1,370/ 1 class + gov fee