FindOwnerSearch
Brands and Their Owners
Welcome to the Brand page for “ARDALYST”, which is offered here for The mark consists of the stylized black wording ardalyst, to the right of a spiral design comprising three sets of dots, respectively colored blue, orange, and purple, which outline a void in the shape of triangle with curved sides. the dots in each set are arranged into five strands, and the circumference of each dot is proportional to its distance from the center of the spiral design.;the colors orange, blue, purple, and black are claimed as features of the mark.;consulting services for others in the field of design, planning, and implementation project management of cybersecurity systems and protocols; technology consultation in the field of cybersecurity; technology specification, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity;.
Its status is currently believed to be active. Its class is unavailable. “ARDALYST” is believed to be currently owned by “Ardalyst Holdings, LLC”.
| Owner: |
ARDALYST HOLDINGS, LLC
Owner Details |
|---|---|
| Description: |
The mark consists of the stylized black wording ARDALYST, to the right of a spiral design comprising three sets of dots, respectively colored blue, orange, and purple, which outline a void in the shape of triangle with curved sides. The dots in each set are arranged into five strands, and the circumference of each dot is proportional to its distance from the center of the spiral design.;The colors orange, blue, purple, and black are claimed as features of the mark.;Consulting services for others in the field of design, planning, and implementation project management of cybersecurity systems and protocols; Technology consultation in the field of cybersecurity; Technology specification, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity;
|
| Categories: |