Trademarkia Logo

Canada

C$
FORCEPOINT
REGISTERED

on 15 Jan 2019

Last Applicant/ Owned by

FORCEPOINT LLC

10900-A Stonelake Blvd.Quarry Oaks 1Suite 350Austin, Texas 78759

US

Serial Number

1778534 filed on 21st Apr 2016

Registration Number

TMA1013032 registered on 15th Jan 2019

Registration expiry Date

15th Jan 2034

Correspondent Address

GOWLING WLG (CANADA) LLP

SUITE 2600, 160 ELGIN STREETOTTAWA

ONTARIO

CA

K1P1C3

FORCEPOINT

Trademark usage description

computer hardware, computer software for security and protection, namely, software for the creation of firewalls, software for security analytics, sof Read More

Classification Information


Class [009]
Computer hardware, computer software for security and protection, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of data across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; computer software for the security and protection of data, networks and communications, namely, software for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention.


Classification kind code

10

Class [042]
Providing computer software services, namely, web, hardware, network, computer and internet security services by restricting and monitoring access to unauthorized areas in a global computer network or any other publicly accessible computer network for the purposes of promoting security and the computer user's productivity, by restricting access to and by computers to web sites, and by providing email messaging security and electronic data security; providing temporary use of non-downloadable computer software, namely, software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of data across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing temporary use of non-downloadable computer software for security and protection, namely, software for use in maintaining and monitoring web security, data security and e-mail security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use by others in relation to security and protection computer software; cloud computing services featuring computer software for use in security and protection, namely, computer software for the creation of firewalls, software for security analytics, software for use by security analysts to facilitate the search and analysis of data related to cyber and real-world threats, software for network security, load balancing, and routing, software for web, hardware, network, computer and internet security, software for monitoring and controlling access to sites and locations on a global computer network, software that enables safe, secure and simultaneous data movement within and between computer networks, software that enables, controls and audits sharing of data across computer networks, software that enables users to enable and control access to computers, computer networks, data, documents and other software applications with multiple and differing access criteria, and software that provides users with simultaneous access to multiple computer networks; providing non-downloadable computer software services for the security and protection of data, networks, and communications, namely non-downloadable computer software services for providing web security and protection, providing e-mail messaging security and protection, and for data loss prevention.


Classification kind code

10

Mark Details


Serial Number

1778534

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 26
on 14th Jun 2018
Approved
Submitted for opposition 27
on 24th Apr 2018
Approval Notice Sent
Submitted for opposition 15
on 7th Dec 2017
Correspondence Created
Submitted for opposition 80
on 24th May 2017
Change of Title Registered
Submitted for opposition 12
on 16th May 2017
Extension of Time
Submitted for opposition 22
on 26th Oct 2016
Search Recorded
Submitted for opposition 20
on 26th Oct 2016
Examiner's First Report
Submitted for opposition 31
on 25th Apr 2016
Formalized
Submitted for opposition 1
on 22nd Apr 2016
Created
Submitted for opposition 30
on 21st Apr 2016
Filed