Australian Trade Mark Search

Australian Trade Mark Search is the Australian Government’s trade mark search system.

Additional fields:

Trade mark 2551888

IR number 1856869
Words VARONIS
Image
Image description
Status protected: Registered/protected
Priority date 15 Aug 2024 (Convention)
Classes 35, 42
Kind Word
Dates
Renewal due 03 Dec 2034
Registration advertised / published 19 Mar 2026
Entered on Register 19 Mar 2026
Acceptance advertised / published 12 Jan 2026
Acceptance 12 Jan 2026
IR notification 29 May 2025
Filing 03 Dec 2024
Registered from 03 Dec 2024

Owner Address for service
VARONIS SYSTEMS, INC.
By George Legal

IR Contact

Herzog Fox & Neeman


Goods & Services
Class 35: Promoting the use of security assurance best practices of others in the fields of business computing and data governance; computer file management; updating and maintenance of data in computer databases; business assistance services, namely, assisting businesses with assessing, guarding against and addressing cybersecurity threats to business systems; Data processing services using proprietary software for data collection, classification, management, monitoring, reporting and analysis; and for user access control, permission management, auditing and analysis of data access and usage.
Class 42: Software as a service (SaaS) service featuring software in the fields of cybersecurity and data governance; software as a services (SaaS) featuring data automation software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; technology consultation in the field of cybersecurity and data governance; cybersecurity and data governance services in the nature of restricting unauthorized access to computer systems; computer security consultancy; data security consultancy; design and development of electronic data security systems; computer security threat analysis for protecting data; computer services, namely, data recovery services; design, development, installation, maintenance and updating of computer software in the fields of cybersecurity and data governance; development of customized software for others for use in risk assessment, data governance, information security, business analysis, audit and audit planning; computer security services, namely restricting unauthorized access to computer networks; Software as a service (SaaS) featuring data automation and collection service using proprietary software to evaluate, analyze and collect service data; software services for data collection, classification, management, monitoring, reporting and analysis; and for user access control, permission management, auditing and analysis of data access and usage; providing online, non-downloadable software for data collection processing using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; artificial intelligence as a service (AIaaS) services featuring software using artificial intelligence for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software using artificial intelligence for identifying data security vulnerabilities and breaches and providing alerts; Providing temporary use of non-downloadable software enabling users to enter, access, track, manage, monitor and generate information and reports regarding in-house cybersecurity and data governance; Providing temporary use of non-downloadable software enabling users to control, manage, monitor, report on, classify, control access to, audit and analyse data access and usage; software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for developing custom security threat detection, investigation, and response tools; software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer security software for computer, software applications, cloud, and computer network security, automated domain threat protection and prevention, analysis and management of computer threat data, security information and event management, detection, and elimination of computer threats, cyberattacks and data breaches, exploit protection and prevention, and automated remediation and restoration of compromised computer software and hardware; technical support services, namely, troubleshooting of computer software and computer security problems.

Convention details
Date 15 Aug 2024
Number 98700233
Country UNITED STATES OF AMERICA

Indexing constituents
Word Image