NETSPI

Welcome to the Brand page for “NETSPI”, which is offered here for The mark consists of a red square to the left of four other red squares having three red connecting lines. a black square is in the middle of the four red squares and has a black connecting line extending down to another black square that then has another black connecting line extending to the left that connects it to another black square that is aligned with the first red square. the word netspi is in black and to the right of this arrangement of squares and lines.;net spy;the color(s) red and black is/are claimed as a feature of the mark.;comprehensive enterprise security assessment and vulnerability testing services, security risk assessment services and testing of computers and networks to assess information security vulnerability, all provided to business enterprises; providing a computer software platform featuring on-line non-downloadable software for use in security risk assessment, reviewing and assessing information security vulnerability, and auditing information related thereto, all to support global organizations' compliance with applicable regulations, laws and industry requirements;.

Its status is currently believed to be active. Its class is unavailable. “NETSPI” is believed to be currently owned by “NetSPI, LLC”.


Owner:
NETSPI, LLC
Owner Details
Description:
The mark consists of a red square to the left of four other red squares having three red connecting lines. A black square is in the middle of the four red squares and has a black connecting line extending down to another black square that then has another black connecting line extending to the left that connects it to another black square that is aligned with the first red square. The word NETSPI is in black and to the right of this arrangement of squares and lines.;NET SPY;The color(s) red and black is/are claimed as a feature of the mark.;Comprehensive enterprise security assessment and vulnerability testing services, security risk assessment services and testing of computers and networks to assess information security vulnerability, all provided to business enterprises; Providing a computer software platform featuring on-line non-downloadable software for use in security risk assessment, reviewing and assessing information security vulnerability, and auditing information related thereto, all to support global organizations' compliance with applicable regulations, laws and industry requirements;
Categories: