South Wales, Feb. 27 -- United Kingdom Intellectual Property Office (UKIPO) has registered trademark "AGILE IDENTITY LTD" on Feb. 4. The details about the trademark application no. UK00004335510 published in the journal no. 2026/009 (Feb. 27).

With Lawrie IP Limited as representative, AGILE IDENTITY LTD filed the trademark application for the below mentioned good(s)/service(s).

Class 9 : Computer hardware, software and firmware related to the performance and security of Information Technology systems, computers, networks, servers and applications; Identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; security software for sharing and storing sensitive information over an enterprise network and over the Internet; software for automating authentication and governance of identity over the internet and other computer networks; software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and one time password (otp), biometric software and hardware for providing computer and mobile device user identity authentication; security software for protecting, monitoring and detecting privileged accounts; computer manuals distributed integrally therewith; recorded and downloadable computer software for management of human and non-human digital identities; recorded and downloadable software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; recorded and downloadable computer software for access control management of human and non-human digital identities; hardware, software and firmware relating to telecommunication networks; computer network switches; recorded and downloadable computer software for detection, analysis and remediation of cyber threats; downloadable software for securing software development and operation pipelines; downloadable software for use in cyber defence training and cyber skills assessment; cyber security software; computer software for provisioning, deploying, configuring, managing, securing, optimising, monitoring, backing-up, recovering, modelling, testing, storing, upgrading, diagnosing, fixing, analysing, problem resolving, discovering, and using multiple operating systems, computer networks and virtual computing infrastructure; computer software for use in provisioning, deploying, configuring, managing, securing, optimizing, monitoring, backing-up, recovering, modelling, testing, storing, upgrading, diagnosing, fixing, analysing, problem resolving, discovering, and using hardware and software resources and components of computer and communications networks, and to enable cross-platform functionality, for businesses and individuals; application software and downloadable application software for hybrid cloud storage and delivery of data; project management software; computer software for controlling and managing access server applications; access interfaces for managed private circuit networks; biometric access control systems; downloadable digital assets; downloadable computer software for use as a digital wallet; downloadable digital image files authenticated by non-fungible tokens (NFTs); operational risk management software; integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloguing third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloguing third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance.

Class 35 : Business consultancy services relating to Identity Access Management and Governance (IMAG); business consultancy services relating to Identity and Access Management (IAM); business services, namely, business consultation services, business advice and information services; business administration; business networking; compilation of statistical information; compilation of statistical data relating to business; business and commercial information services; providing information in the fields of business and commerce over global computer networks and global communications networks.

Class 38 : The provision of access to content, website and portals namely access to content, files, applications and systems; communication services, namely, electronic transmission of data and documents among users of computers; transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, global communication networks and global computer networks information transmission via electronic communications networks; electronic mail and messaging services.

Class 41 : Educational and training services, namely, providing classes, workshops, seminars, conferences, non-downloadable videos and webinars in the field of computers, software, technological developments and information technology; provision of training; online simulation based training services in the field of educational and training services relating to cyber security; training in the development of software systems; educational services, namely, providing of training in the fields of online security, authentication, and identity management; educational services, namely, training courses, testing, and distributing course materials in connection therewith, all in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management.

Class 42 : Consultancy services related to the performance and security of Information Technology systems, computers, networks, servers and applications; analysis of telecommunication networks; installation, repair and maintenance of computer and other IT hardware and software; analysis of telecommunication networks; design and development of computer hardware and software; Software as a service (saas) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; software as a service (saas) services and cloud computing featuring software for automating authentication and governance of identity over the internet and other computer networks; software as a service (saas) services and cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (sms), and voice one time password (otp), biometric software and hardware for providing computer and mobile device user identity authentication; software as a service (saas) services and cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; software as a service (SAAS) services featuring software for managing digital identities; software as a service (SAAS) services featuring software for management, optimization and integration of computer systems and networks, software applications, users, and network resources; software as a service (SAAS) services featuring software for managing access control of human and non-human digital identities; software as a service (SAAS) featuring software for securing, auditing, monitoring and analysis of computer systems, computer networks, cloud computing environments and enterprise software applications; hosting of transactions platforms on the internet; consultancy and information services relating to information technology architecture and infrastructure; infrastructure as a service; providing temporary use of non-downloadable cloud computing software for use in cyber defence training and cyber skills assessment; professional consultancy relating to cyber security; technical consultancy services relating to cyber risk; design and development of software in the field of cyber security; cyber security, data protection and restoration services; cyber resilience & cyber security consultancy; cyber-security services comprising monitoring, testing, analysing, and reporting on the internet traffic control and content control of the websites of others with reference to cyber-security; software as a service featuring hybrid cloud storage and delivery of data; providing temporary use of non-downloadable computer software featuring hybrid cloud storage and delivery of data; providing cloud computing services, namely, providing cloud applications and a cloud platform to build, operate, manage, backup, and secure enterprise, hybrid cloud, and multi-cloud computing, virtualization, and data storage environments; providing online, non-downloadable computer software for building, deploying, operating, and managing a desktop-as-a-service platform for cloud-based applications and desktops for enterprises and end users; Software as a service (SAAS) services featuring cloud-based software for developing and deploying applications; design and provision of specialist computer applications and online non-downloadable computer software for information storage and retrieval services in the field of risk management on the behalf of others; data security consultancy; online computer services, namely, providing email spam filtering services to protect websites and online applications from receiving unsolicited messages; technical support, namely, monitoring and managing technological functions of computer network systems and servers, service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications, providing backup computer programs and facilities; computer virus protection services; consulting services and technical support in the field of IT incident response and IT incident management; consulting services in the field of testing and deploying IT infrastructure, operating systems, database systems, software, hardware and web applications; incident management for testing and deploying IT infrastructure, operating systems, database systems, software, hardware and web applications; installation and maintenance of Internet access software; encryption of digital images; cross-platform conversion of digital content into other forms of digital content; technological consultancy services for digital transformation; digital asset management; digital asset management; Infrastructure as a Service [IaaS]; design and development of computer software for logistics, supply chain management and e-business portals; Installation of Access Control as a Service (ACaaS) software; Design and development of virtual private network (VPN) operating software; technical consultancy services relating to Identity Access Management and Governance (IMAG); technical consultancy services relating to Identity and Access Management (IDAM/IAM); provision of websites allow consultants and customers to collaborate more transparently and access IAM tools from anywhere with proper authentication; Software as a service (SAAS) services featuring Identity and Assessment Management services (IDAM) via websites, databases, and portals to deliver secure, efficient, and scalable identity services; software as a service (SAAS) via websites manage communications and self service functions, databases store and structure identity data, and portals provide centralised operational control.

The original document can be viewed at: http://www.ipo.gov.uk/cgi-bin/redirect.cgi?type=tmj&link=6¶m1=UK00004335510

Disclaimer: Curated by HT Syndication.