FindOwnerSearch
Brands and Their Owners
Welcome to the Brand page for “XT XTON TECHNOLOGIES”, which is offered here for The mark consists of the letters xt surrounded by a partially perforated box. to the right of the box appears the letters xton in all capital block font with the word technologies appearing underneath in a smaller, lower-case, thinner font.;color is not claimed as a feature of the mark.;exton technologies;providing temporary use of online non-downloadable computer network administration software, software for identifying risk to computer network applications and database security, analyzing and evaluating identity data, compliance management, access request, password management, user provisioning, security analytics and reporting, and for auditing and monitoring computer network and database security; providing temporary use of online non-downloadable computer software for monitoring and reporting on security policies, information technology (it) controls, and security breaches and other unauthorized activities conducted via a global computer network;.
Its status is currently believed to be active. Its class is unavailable. “XT XTON TECHNOLOGIES” is believed to be currently owned by “Exton Soft LLC”.
Owner: |
EXTON SOFT LLC
Owner Details |
---|---|
Description: |
The mark consists of the letters XT surrounded by a partially perforated box. To the right of the box appears the letters XTON in all capital block font with the word TECHNOLOGIES appearing underneath in a smaller, lower-case, thinner font.;Color is not claimed as a feature of the mark.;EXTON TECHNOLOGIES;Providing temporary use of online non-downloadable computer network administration software, software for identifying risk to computer network applications and database security, analyzing and evaluating identity data, compliance management, access request, password management, user provisioning, security analytics and reporting, and for auditing and monitoring computer network and database security; Providing temporary use of online non-downloadable computer software for monitoring and reporting on security policies, information technology (IT) controls, and security breaches and other unauthorized activities conducted via a global computer network;
|
Categories: |