MANX CAPITAL GROUP, INC.

 MANX CAPITAL GROUP, INC. contact information is shown below
Owner:MANX CAPITAL GROUP, INC.
Owner Address:251 Little Falls Drive Wilmington DE 19807
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byMANX CAPITAL GROUP, INC.

Brand:

CONTEXT

Description:

Computer software for network forensics; computer software for monitoring and analysis of computer network traffic, associated security events and artifacts for the purposes of information gathering, legal evidence, or intrusion detection; computer networking hardware;Computer services, namely, network forensics services; computer services, namely, monitoring and analysis of computer network traffic, associated security events and artifacts for the purposes of information gathering, legal evidence, or intrusion detection; providing temporary use of non-downloadable cloud-based software for network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic, associated security events and artifacts for the purposes of information gathering, legal evidence, or intrusion detection;

Category: COMPUTER SOFTWARE NETWORK FORENSICS
Brand:

FINMON

Description:

Software as a service (SAAS) services featuring software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same; Providing temporary use of on-line non-downloadable software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same;

Category: SOFTWARE AS SERVICE SAAS
Brand:

FINMON

Description:

Software as a service (SAAS) services featuring software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same; Providing temporary use of on-line nondownloadable software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same;

Category: SOFTWARE AS SERVICE SAAS
Brand:

GICH

Description:

Transmission and delivery of digital data;Operating an online marketplace for buyers and sellers of goods in the field of digital data files;Providing an interactive website featuring technology that allows users to upload and download digital data, images, photos, videos and text;

Category: TRANSMISSION DELIVERY DIGITAL
Brand:

HUNTER

Description:

computer software for identification of user, application, system and network anomalies; computer software for analysis of user, application, system and network data; computer software for detection and isolation of cyber threats; computer software for security threat analysis; computer networking hardware;Computer security threat analysis for protecting data; Providing temporary use of non-downloadable cloud-based software for identification of user, application, system and network anomalies; Providing temporary use of non-downloadable cloud-based software for detection and isolation of cyber threats; computer software for security threat analysis; Providing temporary use of non-downloadable cloud-based software for security threat analysis;

Category: COMPUTER SOFTWARE IDENTIFICATION
Brand:

KOMA

Description:

Goggles for sports; motorcycle goggles; snow goggles; swimming goggles; scuba goggles; eyewear; sunglasses; sports helmets; protective helmets; mountain biking helmets; snowboarding helmets; ski helmets;Gloves for sports, namely, gloves for football, baseball, batting, hockey, boxing, running, fencing, rowing, skateboarding, windsurfing, waterskiing, handball, bowling, swimming, karate, weight lifting, yoga, working out; golf gloves;Clothing for golf, sports, mountain biking, cycling, snow, namely, tops and bottoms; headwear and footwear for golf, sports, mountain biking, cycling, snow; gloves; ski gloves; snowboard gloves; mountain biking gloves; cycling gloves;

Category: GOGGLES SPORTS
Brand:

KOMA

Description:

Golf gloves;Color is not claimed as a feature of the mark.;

Category: GOLF GLOVES
Brand:

POWERED BY CONTEXT. DRIVEN BY DATA.

Description:

Computer software for computer network forensics; computer software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering, or intrusion detection; computer networking hardware;Computer services, namely, computer network forensics services; computer services, namely, monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering, or intrusion detection; providing temporary use of non-downloadable cloud-based software for computer network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering, or intrusion detection;

Category: COMPUTER SOFTWARE COMPUTER NETWORK
Brand:

PROTECTING TODAY. BUILDING TOMORROW.

Description:

Computer software for protection of electronic data from unintended or unauthorized access, change or destruction; computer software for identification of computer user, application, system and network anomalies; computer software for analysis of computer user, application, system and network data; computer software for detection and isolation of cyber threats; computer software for computer network security threat analysis; computer software for computer network forensics; computer software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; computer anti-virus software; next-generation computer anti-virus software; computer networking hardware;Software as a service (SAAS) services featuring software for protection of electronic data from unintended or unauthorized access, change or destruction; providing temporary use of non-downloadable cloud-based software for identification of computer user, application, system and network anomalies; providing temporary use of non-downloadable cloud-based software for detection and isolation of cyber threats; providing temporary use of non-downloadable cloud-based software for computer network security threat analysis; providing temporary use of non-downloadable cloud-based software for computer network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; providing temporary use of non-downloadable computer anti-virus software and next-generation computer anti-virus software; computer security threat analysis for protecting data; computer services, namely, computer network forensics services; computer services, namely, monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; technical support services, namely, installation, administration and troubleshooting of computer applications;

Category: COMPUTER SOFTWARE PROTECTION
Brand:

R RESECURITY

Description:

The mark consists of a stylized letter R within a solid shield to the left of the characters RESECURITY with a vertical line between RE and SECURITY.;Software for protection of electronic data from unintended or unauthorized access, change or destruction;Color is not claimed as a feature of the mark.;SECURITY;Software as a service (SAAS) services featuring software for protection of electronic data from unintended or unauthorized access, change or destruction; Updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; Technical support services, namely, installation, administration, and troubleshooting of computer applications;

Category: