Trademark Overview
On Friday, January 16, 2026, a trademark application was filed for SOPHOS ITDR with the United States Patent and Trademark Office. The USPTO has given the SOPHOS ITDR trademark a serial number of 99598431. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Friday, January 16, 2026. This trademark is owned by Sophos Limited. The SOPHOS ITDR trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:
Technical consulting in the field of cybersecurity risk management training; Computer education training; Providing information relating to education services; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, cybersecurity, data security, computer security, and network security and distribution of educational materials in connection therewith
Downloadable computer software for encryption; Downloadable computer anti-virus software; Computer hardware; Computer networking hardware; USB computer security key; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of cybersecurity, data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable computer software for cybersecurity; Downloadable computer software for ownloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile device; Downloadable computer software for IT infrastructure and cybersecurity automation; Security token hardware for user authentication
Technology consultation in the field of cybersecurity; Monitoring of computer systems to detect cybersecurity incidents; Computer security threat analysis for protecting data; Electronic monitoring of personally identifying information to detect identity theft via the internet; Providing temporary use of non-downloadable computer anti-virus software; Cloud computing featuring software for use managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer...
