BC

Welcome to the Brand page for “BC”, which is offered here for The mark consists of two swords, including hilts, crossed behind a shield. the stylized letters b and c are prominently displayed on the face of the shield. the shield consists of four differently-shaded quadrants; no shade in the top left quadrant, light shade in the top right quadrant, medium shade in the bottom left quadrant, and dark shade in the bottom right quadrant.;recorded computer software for computer security, computer network security, information security, data security, and firewall security purposes; downloadable computer software for scanning, monitoring, and securing computer networks and computing endpoints for cybersecurity purposes;birch cline;color is not claimed as a feature of the mark.;application service provider (asp) featuring software for use in computer and network security; computer network security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer systems analysis; consulting services in the design and implementation of computer-based information systems for businesses; electronic monitoring of personally identifying information to detect identity theft via the internet; monitoring of computer systems for detecting unauthorized access or data breach; technical support, monitoring technological functions of computer network systems; technological planning and consulting services in the field of computer, data, and network security; testing, analysis, and evaluation of computer, data, and network systems to assure compliance with cybersecurity industry standards; consulting services in the field of software as a service (saas); software as a service (saas) services featuring software for security information and event management (siem);.

Its status is currently believed to be active. Its class is unavailable. “BC” is believed to be currently owned by “Birch Cline Technologies, Inc.”


Owner:
BIRCH CLINE TECHNOLOGIES, INC.
Owner Details
Description:
The mark consists of two swords, including hilts, crossed behind a shield. The stylized letters B and C are prominently displayed on the face of the shield. The shield consists of four differently-shaded quadrants; no shade in the top left quadrant, light shade in the top right quadrant, medium shade in the bottom left quadrant, and dark shade in the bottom right quadrant.;Recorded computer software for computer security, computer network security, information security, data security, and firewall security purposes; Downloadable computer software for scanning, monitoring, and securing computer networks and computing endpoints for cybersecurity purposes;BIRCH CLINE;Color is not claimed as a feature of the mark.;Application service provider (ASP) featuring software for use in computer and network security; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer services, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer systems analysis; Consulting services in the design and implementation of computer-based information systems for businesses; Electronic monitoring of personally identifying information to detect identity theft via the internet; Monitoring of computer systems for detecting unauthorized access or data breach; Technical support, monitoring technological functions of computer network systems; Technological planning and consulting services in the field of computer, data, and network security; Testing, analysis, and evaluation of computer, data, and network systems to assure compliance with cybersecurity industry standards; Consulting services in the field of software as a service (SAAS); Software as a service (SAAS) services featuring software for security information and event management (SIEM);
Categories: