KIS as a trademark was registered on 28 July 2016, in classes 9 and 42, with the European Union Intellectual Property Office (EUIPO
Kings Intelligence Service (KIS) has already proved hugely successful for clients from national retailers to multi-site businesses

The security and intelligence firm Kings Security has successfully attained a Europe-wide trademark for its cutting edge product, Kings Intelligence Service (KIS).

Evolving Security Intelligence

KIS is a real-time, online security intelligence product that has already proved hugely successful for clients that include national retailers and regional multi-site businesses. Unique, and constantly evolving, updates to this fantastically innovative offering in the pipeline are likely to be announced in September of this year.

KIS as a trademark was registered on 28 July 2016, in classes 9 and 42, with the European Union Intellectual Property Office (EUIPO), and will be valid for a period of 10 years. At the same time, the KIS strapline “Vision Without Boundaries” has also received trademark protection.

Save

Stay ahead in the era of intelligent security systems powered by Artificial Intelligence with our special e-magazine on AI in security.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...