FindOwnerSearch
Brands and Their Owners
| Axonius Solutions, Ltd. contact information is shown below | |
| Owner: | AXONIUS SOLUTIONS, LTD. |
|---|---|
| Owner Address: | 132 Menachem Begin Street Circular Tower, FL 23 670110 Israel |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
AXONIUS |
|---|---|
| Description: | Downloadable software for computer network security; downloadable computer software for management of physical and virtual devices connected to a network for the detection of unauthorized access and data breaches and for authorization management;Computer network security services, namely, management of an organization's IT asset inventory and infrastructure to optimize performance and identify and remediate security issues; monitoring of computer systems of network-connected physical and virtual devices by remote access for the detection of unauthorized access and data breaches and for authorization management; monitoring of computer systems of network-connected physical and virtual devices for detecting unauthorized access or data breach; |
| Category: | DOWNLOADABLE SOFTWARE COMPUTER NETWORK |
| Brand: |
AXONIUS |
|---|---|
| Description: | The mark consists of four radially arranged hourglass shapes surrounding a center circle, forming a stylized letter X, appearing above the literal element AXONIUS.;Downloadable software for computer network security; downloadable computer software for management of physical and virtual devices connected to a network for the detection of unauthorized access and data breaches and for authorization management;Color is not claimed as a feature of the mark.;Computer network security services, namely, management of an organization's IT asset inventory and infrastructure to optimize performance and identify and remediate security issues; monitoring of computer systems of network-connected physical and virtual devices by remote access for the detection of unauthorized access and data breaches and for authorization management; monitoring of computer systems of network-connected physical and virtual devices for detecting unauthorized access or data breach; |
| Category: |