ON2IT B.V.

 ON2IT B.V. contact information is shown below
Owner:ON2IT B.V.
Owner Address:Hogeweg 35 LJ Zaltbommel 5301 Netherlands
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byON2IT B.V.

Brand:

MSOC

Description:

Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analyzing software computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches and advances persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely, keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely, analyzing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security services; computer security system monitoring services; computer security services, namely, analysis of computers and networks to assess information security vulnerability and cyber threats; computer security services, namely, development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP), namely, hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;

Category: DATA PROCESSING EQUIPMENT COMPUTER
Brand:

ON2IT

Description:

Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analysing computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;Telecommunication services, namely, establishing telecommunications connections to computer networks or cloud environments, provision of online communications services via computer networks, mobile networks, Internet or cloud environments, electronic mail, message sending and receiving services; transmission and distribution of data via computer networks, mobile networks, Internet or cloud environments;ON TO IT;Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely, keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely, analyzing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security consultancy services; computer security system monitoring services; computer security services, namely, analysis of computers and networks to assess information security vulnerability and cyber threats; development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP), namely, hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;

Category: DATA PROCESSING EQUIPMENT COMPUTER
Brand:

ON2IT

Description:

The mark consists of the words (in broken letter format) on and it with a 2 in a circle therebetween, the 2 being in broken number format and the circle being in broken circle format.;(Based on Section 44(e)) Data processing equipment and downloadable cyber security computer software for the purpose of cyber security; Downloadable computer virus scanning and blocking software; Downloadable computer software platform for analyzing security log files for cyber security and information technology security; Downloadable computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; Downloadable computer software consisting of internet and telecommunications based applications for Cyber-Security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;(Based on Section 44(e)) Telecommunication services, namely, establishing telecommunications connections to computer networks or cloud environments, provision of online communications services via computer networks, mobile networks, Internet or cloud environments, electronic mail, message sending and receiving services; transmission and distribution of data via computer networks, mobile networks, Internet or cloud environments;ON TO IT;Color is not claimed as a feature of the mark.;(Based on Use In Commerce and Section 44(e))Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely, keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely, analysing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security consultancy services; computer security system monitoring services; computer security services, namely, analysis of computers and networks to assess information security vulnerability and cyber threats; development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP), namely, hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;

Category: