Australia, July 29 -- Syteca Inc., owns the trademark (2546164) for 'SYTECA' till March 20, 2035.

Status: protected: Registered/protected

Classes: 9 [Downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; downloadable software for use in auditing of computer systems for cyber security threats; downloadable software for regulatory compliance of computer systems and computer systems audits; downloadable software used for simple and integrated video format reporting for live cyber incident response; downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user activity; downloadable software for managing user software licenses featuring affordable floating licensing subscriptions; downloadable software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; downloadable software for configuring manual approval during login, enforcing endpoint access restrictions, and ensuring that only authorized users can access critical systems; downloadable software to manage and monitor privileged accounts and their access to systems and data within a network; downloadable software for managing credentials, passwords, and privileged data, to ensure secure access to databases, operating systems, and web-based IT resources; downloadable software for controlling remote access to privileged accounts with real-time monitoring and session recording, to ensure compliance and security; downloadable software for implementing multi-factor authentication used to verify and manage privileged user identities; downloadable software used for integrating with directory services for the centralized management of privileged accounts across on-premises and cloud environments; downloadable software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; downloadable software for real-time monitoring and threat detection of privileged account activities, with automated response capabilities for security incidents; downloadable software for integration with third-party applications and cloud services, used to allow seamless integration with ticketing systems, SIEM tools, and other IT management systems; downloadable software for enforcing identity policies across diverse IT environments and ensuring authorized access to sensitive data and systems; downloadable software for securely storing and managing individual user credentials in a personal password vault.] and 42 [Development and implementation of software solutions for universal and network protocol diagnostic monitoring; monitoring of computer systems for detecting and analyzing user-based insider threats to data; monitoring of third-party contractors and other business partners computer systems for cyber security threats to data; development of customized software for others for use in regulatory compliance and in auditing of computer systems for cyber security threats; providing temporary use of on-line non-downloadable software tools used for simple and integrated video format reporting for live cyber incident response; providing temporary use of non-downloadable software for conducting a multi-factor search of computer systems cyber threats and generating corresponding reports; development of customized software for others for user software license management featuring affordable floating licensing subscriptions; providing temporary use of non-downloadable cloud-based software as tools for monitoring insider computer security; software as a service (SaaS) services featuring software for monitoring user activity on computer systems and computer servers; software as a service (SaaS) services featuring software for privileged access management used to manage and monitor privileged accounts and their access to systems and data within a network; software as a service (SaaS) services featuring software used for managing credentials, passwords, and privileged data, and for ensuring secure access to databases, operating systems, and web-based IT resources; software as a service (SaaS) services featuring software for controlling remote access to privileged accounts, equipped with real-time monitoring and session recording to ensure compliance and security; software as a service (SaaS) services featuring software for implementing multi-factor authentication used to verify and manage privileged user identities, equipped with dynamic privilege adjustment based on risk; software as a service (SaaS) services featuring software for integrating with directory services for centralized management of privileged accounts across on-premises and cloud environments and for providing unified audit trails and reporting; software as a service (SaaS) services featuring software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; software as a service (SaaS) services featuring software for real-time monitoring and threat detection of privileged account activities, equipped with automated response capabilities for security incidents; software as a service (SaaS) services featuring software for enforcing identity policies across diverse IT environments, and for ensuring authorized access to sensitive data and systems; software as a service (SaaS) services featuring software for securely storing and managing individual user credentials in a personal password vault, and for ensuring compliance with security policies; software as a service (SaaS) services featuring software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; software as a service (SaaS) services featuring software for configuring manual approval during login and for enforcing endpoint access restrictions to ensure that only authorized users can access critical systems; software as a service (SaaS) services featuring software for session recording and for playback used to enable administrators to review user actions on endpoints for compliance audits and security investigations; software as a service (SaaS) services featuring software for integration with third-party applications and cloud services to allow for seamless integration with ticketing systems, SIEM tools, and other IT management systems; software as a service (SaaS) services featuring software used for endpoint activity monitoring, providing detailed reports on application usage, web browsing, and other user activities to support productivity and security analysis; software as a service (SaaS) services featuring software for automating policy enforcement across user sessions and ensuring consistent application of security controls across all managed endpoints; software as a service (SaaS) services featuring software for the centralized management of privileged user sessions, used for role-based access control and user session termination.]

Type of Mark: Word

Date of Acceptance: May 20

Registration Advertised: July 28

For further details contact Preetha Chakrabarti Crowell & Moring LLP .

The original document can be viewed at: https://search.ipaustralia.gov.au/trademarks/search/view/2546164.

Disclaimer: Curated by HT Syndication.