M MENAYA

Welcome to the Brand page for “M MENAYA”, which is offered here for The mark consists of the word menaya appearing in dark blue in stylized font, to the left of the word appears a design of a stylized letter m and dot all in the color coral.;downloadable computer software for cybersecurity; recorded computer software for cybersecurity; downloadable computer software for protection of computer networks and systems ; recorded computer software for protection of computer networks and systems ; downloadable computer security software; downloadable computer software for generating cryptographic keys ; recorded computer software for generating cryptographic keys ; downloadable computer software for the security of computer networks and units; recorded computer software for the security of computer networks and units; high-definition multimedia interface usb security keys; downloadable computer software for the remote control of security devices; recorded computer software for the remote control of security devices; downloadable computer software for monitoring the access and security of buildings ; recorded computer software for monitoring the access and security of buildings ; security and control devices for computers, computer networks and telecommunications equipment; devices, apparatus, computer programs and databases for encoding, receiving, generating, processing, retrieving, displaying, storing, communicating, exchanging, tracing and transmitting data and information; safety, security, protection and signaling devices for buildings; electrical and electronic security devices and instruments for computers ; security monitoring devices for computers ; wireless controllers to remotely monitor and control the function and status of security systems ; computer hardware, firewalls ; downloadable computer software for the creation of firewalls;the color(s) coral, dark blue is/are claimed as a feature of the mark.;software as a service (saas) services featuring computer software for the detection of cyber-security risks; computer services, on-line detection of malware programs on computers and electronic devices; computer security services, to secure and protect data, computer services, computer systems and computer networks ; computer systems and data security services, to secure and protect data, computer services computer systems and computer networks ; computer programming services, to secure and protect data, computer services, computer systems and computer networks; services in the nature of design, development, installation, maintenance, updating and leasing of computer programs and computer software for cybersecurity and protection for networks and computer systems ; maintenance of computer software for security and prevention of computer risks ; computer programming of internet security programs; design and development of electronic data security systems; computer programming services for electronic data security; software as a service (saas) and platform as a service (paas) services offering cybersecurity related software; computer virus protection services; data encryption services; electronic monitoring of personally identifiable information; computer data and personal information security services; computer security services in the form of provision of digital certificates; provision of computer security risk management programs; computer security threat analysis for data protection; computer security services for the detection of unauthorized access to electronically stored data, files, documents and information; computer security services for the protection against unauthorized access to networks; computer security consulting; data security consulting services; internet security consulting services; telecommunication network security consulting services; telecommunication network security consulting; security software consulting services; remote monitoring of computer systems; professional consulting services in the field of computer security; monitoring of computer systems for security purposes; security services for computer networks, computer access and computer transactions; technical support services, including remote and on-site infrastructure management services for monitoring, administration and management of public and private information systems and computer applications; research services related to electrical security; technical support services, providing technical advice related to computer security; computer security services in the nature of measuring and monitoring cyber security risks;.

Its status is currently believed to be active. Its class is unavailable. “M MENAYA” is believed to be currently owned by “MENAYA INC.”

Owner:
MENAYA INC.
Owner Details
Description:
The mark consists of the word MENAYA appearing in dark blue in stylized font, to the left of the word appears a design of a stylized letter M and dot all in the color coral.;Downloadable computer software for cybersecurity; recorded computer software for cybersecurity; downloadable computer software for protection of computer networks and systems ; recorded computer software for protection of computer networks and systems ; downloadable computer security software; downloadable computer software for generating cryptographic keys ; recorded computer software for generating cryptographic keys ; downloadable computer software for the security of computer networks and units; recorded computer software for the security of computer networks and units; high-definition multimedia interface USB security keys; downloadable computer software for the remote control of security devices; recorded computer software for the remote control of security devices; downloadable computer software for monitoring the access and security of buildings ; recorded computer software for monitoring the access and security of buildings ; security and control devices for computers, computer networks and telecommunications equipment; devices, apparatus, computer programs and databases for encoding, receiving, generating, processing, retrieving, displaying, storing, communicating, exchanging, tracing and transmitting data and information; safety, security, protection and signaling devices for buildings; electrical and electronic security devices and instruments for computers ; security monitoring devices for computers ; wireless controllers to remotely monitor and control the function and status of security systems ; computer hardware, firewalls ; downloadable computer software for the creation of firewalls;The color(s) coral, dark blue is/are claimed as a feature of the mark.;Software as a service (SAAS) services featuring computer software for the detection of cyber-security risks; Computer services, on-line detection of malware programs on computers and electronic devices; Computer security services, to secure and protect data, computer services, computer systems and computer networks ; Computer systems and data security services, to secure and protect data, computer services computer systems and computer networks ; Computer programming services, to secure and protect data, computer services, computer systems and computer networks; Services in the nature of design, development, installation, maintenance, updating and leasing of computer programs and computer software for cybersecurity and protection for networks and computer systems ; Maintenance of computer software for security and prevention of computer risks ; computer programming of Internet security programs; Design and development of electronic data security systems; Computer programming services for electronic data security; Software as a Service (SaaS) and Platform as a Service (PaaS) services offering cybersecurity related software; Computer virus protection services; Data encryption services; Electronic monitoring of personally identifiable information; Computer data and personal information security services; Computer security services in the form of provision of digital certificates; Provision of computer security risk management programs; Computer security threat analysis for data protection; Computer security services for the detection of unauthorized access to electronically stored data, files, documents and information; Computer security services for the protection against unauthorized access to networks; Computer security consulting; Data security consulting services; Internet security consulting services; Telecommunication network security consulting services; Telecommunication network security consulting; Security software consulting services; Remote monitoring of computer systems; Professional consulting services in the field of computer security; Monitoring of computer systems for security purposes; Security services for computer networks, computer access and computer transactions; Technical support services, including remote and on-site infrastructure management services for monitoring, administration and management of public and private information systems and computer applications; Research services related to electrical security; Technical support services, providing technical advice related to computer security; computer security services in the nature of measuring and monitoring cyber security risks;
Categories: