FindOwnerSearch
Brands and Their Owners
| BullWall A/S contact information is shown below | |
| Owner: | BULLWALL A/S |
|---|---|
| Owner Address: | ÿster Snedevej 15B, st. Vejle ￿st 7120 Denmark |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
BULLWALL |
|---|---|
| Description: | Security software; computer software; firmware; computer systems;BULL WALL;Software development; development of computer programs; development of computer firmware; development of computer systems; computer and information technology consultancy services; advisory services relating to computer programming; information technology [IT] consultancy; rental of computer software; computer software consultancy; software as a service [SaaS]; computer virus protection services; monitoring of computer systems for security purposes; provision of security services for computer networks, computer access and computerised transactions; |
| Category: | SECURITY SOFTWARE |
| Brand: |
BULLWALL |
|---|---|
| Description: | Security software; computer software; firmware; computer systems;BULL WALL;Software development; development of computer programs; development of computer firmware; development of computer systems; computer and information technology consultancy services; advisory services relating to computer programming; information technology [IT] consultancy; rental of computer software; computer software consultancy; software as a service [SaaS]; computer virus protection services; monitoring of computer systems for security purposes; provision of security services for computer networks, computer access and computerised transactions; |
| Category: | SECURITY SOFTWARE |
| Brand: |
RANSOMCARE |
|---|---|
| Description: | Computer hardware; Downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;RANSOM CARE;Computer security consultancy; Computer security services, namely, restricting unauthorized access to computer networks and monitored devices; Computer technology consultancy; Computer virus protection services; Computer network security consultancy; Consultation services relating to computer software; Design and development of computer firmware; Development of computer platforms; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software as a service (SAAS) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software design and development; Computer software consultancy; Design and development of computer hardware; Providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; |
| Category: | COMPUTER HARDWARE |
| Brand: |
RC |
|---|---|
| Description: | The mark consists of the letters RC alongside a container and shield design inside of circle, which is inside a square.;Computer hardware; Downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;Color is not claimed as a feature of the mark.;Computer security consultancy; Computer security services, namely, restricting unauthorized access to computer networks and monitored devices; Computer technology consultancy; Computer virus protection services; Computer network security consultancy; Consultation services relating to computer software; Design and development of computer firmware; Development of computer platforms; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software as a service (SAAS) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software design and development; Computer software consultancy; Design and development of computer hardware; Providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; |
| Category: |