FindOwnerSearch
Brands and Their Owners
Welcome to the Brand page for “RC”, which is offered here for The mark consists of the letters rc alongside a container and shield design inside of circle, which is inside a square.;computer hardware; downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;color is not claimed as a feature of the mark.;computer security consultancy; computer security services, restricting unauthorized access to computer networks and monitored devices; computer technology consultancy; computer virus protection services; computer network security consultancy; consultation services relating to computer software; design and development of computer firmware; development of computer platforms; information technology consulting services; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; software as a service (saas) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; software design and development; computer software consultancy; design and development of computer hardware; providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;.
Its status is currently believed to be active. Its class is unavailable. “RC” is believed to be currently owned by “BullWall A/S”.
| Owner: |
BULLWALL A/S
Owner Details |
|---|---|
| Description: |
The mark consists of the letters RC alongside a container and shield design inside of circle, which is inside a square.;Computer hardware; Downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;Color is not claimed as a feature of the mark.;Computer security consultancy; Computer security services, restricting unauthorized access to computer networks and monitored devices; Computer technology consultancy; Computer virus protection services; Computer network security consultancy; Consultation services relating to computer software; Design and development of computer firmware; Development of computer platforms; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software as a service (SAAS) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software design and development; Computer software consultancy; Design and development of computer hardware; Providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices;
|
| Categories: |