South Wales, Jan. 9 -- United Kingdom Intellectual Property Office (UKIPO) has registered trademark "SOPHOS XDR" on Nov. 25, 2025. The details about the trademark application no. UK00004300558 published in the journal no. 2026/002 (Jan. 9).
With Slingsby Partners LLP as representative, Sophos Limited filed the trademark application for the below mentioned good(s)/service(s).
Class 42 : Software as a service [SaaS]; Software as a service [SaaS] featuring extended detection and response [XDR] software for cybersecurity; Software as a service [SAAS] services featuring software for IT infrastructure and cybersecurity automation; software as a service [SAAS] services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; software as a service [SAAS] services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; software as a service [SAAS] services featuring software for network asset inventory management; software as a service [SAAS] services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service [SAAS] services featuring software for securing users, and security policies; software as a service [SAAS] services featuring software for visualising users, security policies, computer systems, computer networks, and traffic flow; software as a service [SAAS] services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; software as a service [SAAS] services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; software as a service [SaaS] services featuring software for conducting security and compliance assessments; software as a service [SaaS] services featuring software for enforcing, restricting and controlling access privileges of users; software as a service [SaaS] services featuring software for computer network and computer system security; Software as a service [platforms for artificial intelligence]; providing non-downloadable software on data networks; providing online, non-downloadable software for encryption; platform as a service [PaaS]; platform as a service [PaaS] featuring extended detection and response [XDR] software for cybersecurity; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; monitoring technological functions of computer network systems; monitoring of computer systems for security purposes; monitoring of computer systems to detect cybersecurity incidents; monitoring of computer systems for detecting unauthorised access or data breach; monitoring of computer systems for cybersecurity; electronic monitoring of personally identifying information to detect identity theft via the internet; remote and on-site services for monitoring, administration and management of public and private cloud computing and application computing systems; tracking, monitoring, and reporting for purposes of protecting against data theft, identity theft and fraud; computer services for the protection of software; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services and fraud detection (using AI technology); Connectivity as a Service (CaaS); Hardware as a Service (HaaS); cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; software rental; leasing and hiring of computer hardware; leasing and hiring of computer software; design, configuration, integration and development of computer hardware, computer networks, computer systems and virtual private network (VPN) services; design of communication systems between users; provision of security services for computer networks, using routers, routing switches, remote entry point control apparatus, access control devices, multiplexers and networking devices provided as a service provision of security services for computer networks, using SASE hardware and software for network security functions with wide area networking (WAN) capabilities; software authoring; security operations centre services (SOC); technology consultation in the field of cybersecurity; technology consulting services in the field of cloud computing; technology consulting services in the field of IT infrastructure and cybersecurity automation; IT security, protection and restoration services; computer consulting services; outsource service providers in the field of information technology; computer security consultancy; computer software consulting services; computer technology consulting services; computer security consultancy services; computer and information technology consultancy services; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; artificial intelligence consultancy; research in the field of artificial intelligence technology, deep learning and machine learning technology; research relating to the development of computer programs, software and hardware; technical support services; troubleshooting of computer software problems; computer software technical support services; installation, maintenance and repair of computer software; technical advice relating to operation of computers; technical advice related to computer and computer network security; providing information on data security, and computer security; providing information in the field of security via a website; computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; providing a website used to place on-line commercial orders in the field of computer hardware and computer software; computer security threat analysis for protecting data; computer programming services for the protection of software; data security services; data authentication via blockchain; blockchain as a Service [BaaS]; certification of data via blockchain; user authentication services; authentication services for computer security; computer development services; computer programming services; computer security services; computer security services by way of notification of unauthorised electronic messages and related computer attacks; computer security services for protection against illegal network access; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security services by way of notification of unauthorised electronic messages and related computer attacks; computer security services for protection against spam; information, consultancy and advisory services relating to all the aforesaid services.
The original document can be viewed at: http://www.ipo.gov.uk/cgi-bin/redirect.cgi?type=tmj&link=6¶m1=UK00004300558
Disclaimer: Curated by HT Syndication.