Armored Things Inc.

 Armored Things Inc. contact information is shown below
Owner:ARMORED THINGS INC.
Owner Address:4 Liberty Square, Floor 6 Boston MA 02109
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byArmored Things Inc.

Brand:

ARMORED THINGS

Description:

Downloadable computer software for managing cybersecurity and physical security operations; Downloadable mobile applications for managing cybersecurity, physical security and commercial operations;Software as a service (SAAS) services featuring software for cybersecurity, physical security, and commercial operations management; Consulting services in the fields of cybersecurity, cloud computing, and network security; technology consulting services for anomaly detection, machine learning, and user and entity behavior analytics; Providing and hosting a secure electronic online system featuring technology that allows surveillance to assist in providing defence against data breaches, physical threats, and privacy violations; providing a searchable database in the field of computer forensics and computer hardware and software investigation;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGING
Brand:

AT

Description:

The mark consists of an image combining the letters A and T. The horizontal line of the T shares the same horizontal line of the A.;Downloadable computer software for managing cybersecurity and physical security operations; Downloadable mobile applications for managing cybersecurity, physical security and commercial operations;ARMORED THINGS;Color is not claimed as a feature of the mark.;Software as a service (SAAS) services featuring software for cybersecurity, physical security, and commercial operations management; Consulting services in the fields of cybersecurity, cloud computing, and network security; technology consulting services for anomaly detection, machine learning, and user and entity behavior analytics; Providing and hosting a secure electronic online system featuring technology that allows surveillance to assist in providing defence against data breaches, physical threats, and privacy violations; providing a searchable database in the field of computer forensics and computer hardware and software investigation;

Category: