B

Welcome to the Brand page for “B”, which is offered here for Education, classes, courses, seminars and workshops in the field of it security; online training in the field of it security; educational services, arranging and conducting of colloquiums, conferences, congresses, workshops, seminars and symposiums in the field of it security; providing educational demonstrations in the field of it security; publication of texts relating to it security, other than publicity texts; online electronic publishing of books and journals in the field of it security; providing online nondownloadable electronic publications in the nature of newsletters, articles, brochures, manuals and books in the field of it security; writing of articles for journals in the field of it security, other than for advertising or publicity; providing a website featuring nondownloadable videos in the field of it security; tutoring in the field of it security;the mark consists of a design comprised of a human eye with the stylized letter b therein.;data processing equipment; computer systems, computers, software programs for use in information security, data security, log management, session management, account analytics and hardware programs, computer peripherals, and computer operating systems; computer software platforms for monitoring computer security risks; computer hardware; software and hardware components for control and monitoring data and persons, computer hardware and software, for use in collecting, normalizing, standardizing and parsing data, for processing, transmitting and displaying data, recording, analyzing, indexing, replaying data; computer hardware and software for log management systems; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for data collection, data storage, data analysis and monitoring; recorded or downloadable computer software, computer programs, computer operating programs and computer software applications, all for collecting, processing and storing log messages; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for controlling access to remote it systems, also for recording activities in searchable, movie-like audit trails; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for use in identifying, preventing and curing malicious actions; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for sharing and storing sensitive information over a company network and over the internet; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for managing and securing sensitive information; downloadable image files containing computer programs for information security, data security, log management, session management, account analytics; downloadable electronic publications, books, newsletters, articles, brochures, annuals in the field of computers and it security; all the aforesaid goods related to it security;color is not claimed as a feature of the mark.;scientific and technological services, research and design in the field of it security; technology consultation and research in the field of information and telecommunications technology in the nature of providing security risks assessments of it computers and it websites; design and development of computers, computer software and hardware components; computer system analysis; computer system design; computer networks design; computer software design; computer hardware design; online provision of information relating to the use of computer hardware and computer software in the field of it security; providing information on computer technology and programming via website in the field of it computer and website security; installation of computer software; updating of computer software; maintenance of computer software; rental of computer software; computer programming; recovery of computer data; off-site data backup; electronic data storage; monitoring of computer systems by remote access to ensure proper functioning; consultancy services relating to computer software, consultancy services relating to the design and development of computer hardware, and computer consultation in the field of computer intellectual technology security; consultancy services relating to the creation, development, maintenance and use of software; scientific and technological services, research in the field of computer networking hardware and software; all the aforesaid services related to it security; all the aforesaid services also provided online;.

Its status is currently believed to be active. Its class is unavailable. “B” is believed to be currently owned by “One Identity Software International Limited”.

Owner:
ONE IDENTITY SOFTWARE INTERNATIONAL LIMITED
Owner Details
Description:
Education, classes, courses, seminars and workshops in the field of IT security; online training in the field of IT security; Educational services, arranging and conducting of colloquiums, conferences, congresses, workshops, seminars and symposiums in the field of IT security; Providing educational demonstrations in the field of IT security; publication of texts relating to IT security, other than publicity texts; Online electronic publishing of books and journals in the field of IT security; providing online nondownloadable electronic publications in the nature of newsletters, articles, brochures, manuals and books in the field of IT security; writing of articles for journals in the field of IT security, other than for advertising or publicity; providing a website featuring nondownloadable videos in the field of IT security; tutoring in the field of IT security;The mark consists of a design comprised of a human eye with the stylized letter B therein.;Data processing equipment; computer systems, computers, software programs for use in information security, data security, log management, session management, account analytics and hardware programs, computer peripherals, and computer operating systems; computer software platforms for monitoring computer security risks; computer hardware; software and hardware components for control and monitoring data and persons, computer hardware and software, for use in collecting, normalizing, standardizing and parsing data, for processing, transmitting and displaying data, recording, analyzing, indexing, replaying data; computer hardware and software for log management systems; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for data collection, data storage, data analysis and monitoring; recorded or downloadable computer software, computer programs, computer operating programs and computer software applications, all for collecting, processing and storing log messages; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for controlling access to remote IT systems, also for recording activities in searchable, movie-like audit trails; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for use in identifying, preventing and curing malicious actions; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for sharing and storing sensitive information over a company network and over the internet; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for managing and securing sensitive information; downloadable image files containing computer programs for information security, data security, log management, session management, account analytics; downloadable electronic publications, books, newsletters, articles, brochures, annuals in the field of computers and IT security; all the aforesaid goods related to IT security;Color is not claimed as a feature of the mark.;Scientific and technological services, research and design in the field of IT security; technology consultation and research in the field of information and telecommunications technology in the nature of providing security risks assessments of IT computers and IT websites; design and development of computers, computer software and hardware components; computer system analysis; computer system design; computer networks design; computer software design; computer hardware design; online provision of information relating to the use of computer hardware and computer software in the field of IT security; providing information on computer technology and programming via website in the field of IT computer and website security; installation of computer software; updating of computer software; maintenance of computer software; rental of computer software; computer programming; recovery of computer data; off-site data backup; electronic data storage; monitoring of computer systems by remote access to ensure proper functioning; consultancy services relating to computer software, consultancy services relating to the design and development of computer hardware, and computer consultation in the field of computer intellectual technology security; consultancy services relating to the creation, development, maintenance and use of software; scientific and technological services, research in the field of computer networking hardware and software; all the aforesaid services related to IT security; all the aforesaid services also provided online;
Categories: EDUCATION