FindOwnerSearch
Brands and Their Owners
Welcome to the Brand page for “NEXTHINK”, which is offered here for The mark consists of the wording nexthink in stylized form with letters ne and think in black and the letter x in blue (pantone 7451 c).;computer programs for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form;installation and maintenance of computers, computer hardware and hardware systems;next think;the color(s) blue (pantone 7451 c) and black is/are claimed as a feature of the mark.;design, development, and rental of computers and software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form; installation, updating, and maintenance of software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form;.
Its status is currently believed to be active. Its class is unavailable. “NEXTHINK” is believed to be currently owned by “Nexthink SA”.
Owner: |
NEXTHINK SA
Owner Details |
---|---|
Description: |
The mark consists of the wording NEXTHINK in stylized form with letters NE and THINK in black and the letter X in blue (pantone 7451 c).;Computer programs for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form;Installation and maintenance of computers, computer hardware and hardware systems;NEXT THINK;The color(s) blue (pantone 7451 c) and black is/are claimed as a feature of the mark.;Design, development, and rental of computers and software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form; installation, updating, and maintenance of software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form;
|
Categories: |