N

Welcome to the Brand page for “N”, which is offered here for Training services in the field of internet of things (iot), information security, cybersecurity, computer software, and computer hardware; distribution of educational and training materials in connection therewith and information and advice regarding the aforementioned services;the mark consists of drawing of a box with unequal sides, and the letter n superimposed over it, and 5 different sized diamond shapes to the left of the box.;computer application software, software platforms incorporating technology for securing data with cryptographic information; downloadable or recorded computer software for internet of things, information security, and cybersecurity; downloadable or recorded computer software for encryption and decryption, identity and access management, identity federation, and public key infrastructure (pki) and digital certificate issuance, verification, validation, revocation and management; downloadable or recorded computer software for searching and managing digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status; downloadable or recorded computer software to secure interaction between and among connected devices; downloadable or recorded computer software for secure network operations; downloadable or recorded computer software for management of internet of things (iot)-enabled devices and to facilitate updates and remote diagnostics of internet of things (iot)-enabled devices; downloadable or recorded computer software and computer hardware for the protection of cryptographic infrastructure; downloadable computer software for use in connection with the protection of embedded computer operating software and hardware; downloadable computer software for use in connection with the protection of embedded computer operating software and hardware; computer peripheral devices, accelerators and cryptographic accelerators for data security; tamper-resistant computer software for the secure management, processing, and storing of data and cryptographic keys; recorded content, in particular prerecorded electronic media devices featuring content relating to the internet of things and internet of things security, electronic publications, electronic reports, manuals, and guides relating to smart devices, the internet of things, cyber and device security and cryptography;telecommunications services in the nature of telecommunication access services for machine to machine communications in the internet of things (iot); telecommunications gateway services for the internet of things (iot);authentication, issuance, verification, revocation, and management of digital certificates; providing online non-downloadable software for managing internal, external, or federated identity information; providing online non-downloadable software for searching and management of digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status, digital receipts, certificate validation, encryption and permissions management services; providing online non-downloadable software to secure interaction between and among users, computer networks, the internet, and connected devices; providing online non-downloadable software for secure network operations; providing online non-downloadable software for management of internet of things (iot)-enabled devices and to facilitate updates and remote diagnostics of internet of things (iot)-enabled devices; providing online non-downloadable software for encryption, decryption, authentication and verification of digital signatures, identity management, fraud detection, verification and management of digital keys and credentials, and public key infrastructure (pki) and digital certificate issuance, verification, validation, revocation, and management; providing an online, non-downloadable cloud-based enterprise authentication platform featuring flexible authentication capabilities and a broad range of authenticators, assurance levels and access controls; providing online non-downloadable software for access control and identity authentication to control access to websites, mobile devices, kiosks, physical access control systems and other digital and physical resources and for enforcing, restricting and controlling access to cloud, mobile, or network computer resources; computer software customization, installation, repair, support, and updating; technical support services, troubleshooting in the nature of diagnosing and repairing computer hardware and software problems; technical support services, technical consultation, advice and troubleshooting in planning, migration and implementation of software for internet of things security; providing information via a website in the field of internet of things, information security and cybersecurity, computer software, and computer hardware; computer hardware testing services; computer and device programming for others; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; consulting services in the fields of information security, cybersecurity, internet of things security, computer and device programming; computer services, remote management of computer applications and information technology (it) systems for others; design and development of electronic data security systems; computer services, integration of computer software into multiple systems and networks;.

Its status is currently believed to be active. Its class is unavailable. “N” is believed to be currently owned by “Ntropy.io, Inc.”

Owner:
NTROPY.IO, INC.
Owner Details
Description:
Training services in the field of Internet of Things (IoT), information security, cybersecurity, computer software, and computer hardware; Distribution of educational and training materials in connection therewith and information and advice regarding the aforementioned services;The mark consists of drawing of a box with unequal sides, and the letter N superimposed over it, and 5 different sized diamond shapes to the left of the box.;Computer application software, software platforms incorporating technology for securing data with cryptographic information; Downloadable or recorded computer software for Internet of Things, information security, and cybersecurity; Downloadable or recorded computer software for encryption and decryption, identity and access management, identity federation, and public key infrastructure (PKI) and digital certificate issuance, verification, validation, revocation and management; Downloadable or recorded computer software for searching and managing digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status; Downloadable or recorded computer software to secure interaction between and among connected devices; Downloadable or recorded computer software for secure network operations; Downloadable or recorded computer software for management of internet of things (IoT)-enabled devices and to facilitate updates and remote diagnostics of internet of things (IoT)-enabled devices; Downloadable or recorded computer software and computer hardware for the protection of cryptographic infrastructure; Downloadable computer software for use in connection with the protection of embedded computer operating software and hardware; Downloadable computer software for use in connection with the protection of embedded computer operating software and hardware; Computer peripheral devices, accelerators and cryptographic accelerators for data security; Tamper-resistant computer software for the secure management, processing, and storing of data and cryptographic keys; Recorded content, in particular prerecorded electronic media devices featuring content relating to the Internet of Things and Internet of Things security, electronic publications, electronic reports, manuals, and guides relating to smart devices, the Internet of Things, cyber and device security and cryptography;Telecommunications services in the nature of telecommunication access services for machine to machine communications in the Internet of Things (IoT); Telecommunications gateway services for the Internet of Things (IoT);Authentication, issuance, verification, revocation, and management of digital certificates; Providing online non-downloadable software for managing internal, external, or federated identity information; Providing online non-downloadable software for searching and management of digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status, digital receipts, certificate validation, encryption and permissions management services; Providing online non-downloadable software to secure interaction between and among users, computer networks, the internet, and connected devices; Providing online non-downloadable software for secure network operations; Providing online non-downloadable software for management of Internet of Things (IoT)-enabled devices and to facilitate updates and remote diagnostics of Internet of Things (IOT)-enabled devices; Providing online non-downloadable software for encryption, decryption, authentication and verification of digital signatures, identity management, fraud detection, verification and management of digital keys and credentials, and public key infrastructure (PKI) and digital certificate issuance, verification, validation, revocation, and management; Providing an online, non-downloadable cloud-based enterprise authentication platform featuring flexible authentication capabilities and a broad range of authenticators, assurance levels and access controls; Providing online non-downloadable software for access control and identity authentication to control access to websites, mobile devices, kiosks, physical access control systems and other digital and physical resources and for enforcing, restricting and controlling access to cloud, mobile, or network computer resources; Computer software customization, installation, repair, support, and updating; Technical support services, troubleshooting in the nature of diagnosing and repairing computer hardware and software problems; Technical support services, technical consultation, advice and troubleshooting in planning, migration and implementation of software for Internet of Things security; Providing information via a website in the field of Internet of Things, information security and cybersecurity, computer software, and computer hardware; Computer hardware testing services; Computer and device programming for others; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the fields of information security, cybersecurity, internet of things security, computer and device programming; Computer services, remote management of computer applications and information technology (IT) systems for others; Design and development of electronic data security systems; Computer services, integration of computer software into multiple systems and networks;
Categories: TRAINING SERVICES FIELD