FindOwnerSearch
Brands and Their Owners
Welcome to the Brand page for “WINDEN”, which is offered here for Cloud computing software; cloud servers; cloud server software; cloud network monitoring software; security software; cryptography software; software testing software; privacy software; software for digital distributed storage;transfer of data by telecommunications; wireless transfer of data via the internet; wireless transfer of data via wireless application protocols;the color(s) black and white is/are claimed as a feature of the mark.;internet security consultancy; telecommunication network security consultancy; analytical services relating to computers; comparative analysis studies of the performance of computer systems; software development, programming and implementation; information technology (it) consultancy; it security, protection and restoration; software as a service (saas); rental of software; cloud hosting provider services; cloud storage services for electronic files; providing virtual computer systems through cloud computing; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable operating software for accessing and using a cloud computing network; advisory services relating to computer programming; testing of computer programs; computer security services for protection against illegal network access; consultancy in the field of security software; provision of computer security risk management programs; provision of security services for computer networks, computer access and computerized transactions; computer programming services for electronic data security; design and development of internet security programs; monitoring of computer systems for detecting unauthorized access or data breach; it services for data protection; data warehousing; design and development of data storage systems; designing cryptographic protocols for use in software and it systems; analyzing the selection and implementation cryptography in software and it systems;.
Its status is currently believed to be active. Its class is unavailable. “WINDEN” is believed to be currently owned by “Least Authority TFA GmbH”.
| Owner: |
LEAST AUTHORITY TFA GMBH
Owner Details |
|---|---|
| Description: |
Cloud computing software; cloud servers; cloud server software; cloud network monitoring software; security software; cryptography software; software testing software; privacy software; software for digital distributed storage;Transfer of data by telecommunications; wireless transfer of data via the Internet; wireless transfer of data via wireless application protocols;The color(s) black and white is/are claimed as a feature of the mark.;Internet security consultancy; telecommunication network security consultancy; analytical services relating to computers; comparative analysis studies of the performance of computer systems; software development, programming and implementation; information technology (IT) consultancy; IT security, protection and restoration; software as a service (SaaS); rental of software; cloud hosting provider services; cloud storage services for electronic files; providing virtual computer systems through cloud computing; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; providing temporary use of on-line non-downloadable operating software for accessing and using a cloud computing network; advisory services relating to computer programming; testing of computer programs; computer security services for protection against illegal network access; consultancy in the field of security software; provision of computer security risk management programs; provision of security services for computer networks, computer access and computerized transactions; computer programming services for electronic data security; design and development of Internet security programs; monitoring of computer systems for detecting unauthorized access or data breach; IT services for data protection; data warehousing; design and development of data storage systems; designing cryptographic protocols for use in software and IT systems; analyzing the selection and implementation cryptography in software and IT systems;
|
| Categories: | CLOUD COMPUTING SOFTWARE |