BullWall A/S

 BullWall A/S contact information is shown below
Owner:BULLWALL A/S
Owner Address:ÿster Snedevej 15B, st. Vejle ￿st 7120 Denmark
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byBullWall A/S

Brand:

BULLWALL

Description:

Security software; computer software; firmware; computer systems;BULL WALL;Software development; development of computer programs; development of computer firmware; development of computer systems; computer and information technology consultancy services; advisory services relating to computer programming; information technology [IT] consultancy; rental of computer software; computer software consultancy; software as a service [SaaS]; computer virus protection services; monitoring of computer systems for security purposes; provision of security services for computer networks, computer access and computerised transactions;

Category: SECURITY SOFTWARE
Brand:

BULLWALL

Description:

Security software; computer software; firmware; computer systems;BULL WALL;Software development; development of computer programs; development of computer firmware; development of computer systems; computer and information technology consultancy services; advisory services relating to computer programming; information technology [IT] consultancy; rental of computer software; computer software consultancy; software as a service [SaaS]; computer virus protection services; monitoring of computer systems for security purposes; provision of security services for computer networks, computer access and computerised transactions;

Category: SECURITY SOFTWARE
Brand:

RANSOMCARE

Description:

Computer hardware; Downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;RANSOM CARE;Computer security consultancy; Computer security services, namely, restricting unauthorized access to computer networks and monitored devices; Computer technology consultancy; Computer virus protection services; Computer network security consultancy; Consultation services relating to computer software; Design and development of computer firmware; Development of computer platforms; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software as a service (SAAS) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software design and development; Computer software consultancy; Design and development of computer hardware; Providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;

Category: COMPUTER HARDWARE
Brand:

RC

Description:

The mark consists of the letters RC alongside a container and shield design inside of circle, which is inside a square.;Computer hardware; Downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;Color is not claimed as a feature of the mark.;Computer security consultancy; Computer security services, namely, restricting unauthorized access to computer networks and monitored devices; Computer technology consultancy; Computer virus protection services; Computer network security consultancy; Consultation services relating to computer software; Design and development of computer firmware; Development of computer platforms; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software as a service (SAAS) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software design and development; Computer software consultancy; Design and development of computer hardware; Providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;

Category: