BT

Welcome to the Brand page for “BT”, which is offered here for Computer educational and training services in the field of implementing and configuring privileged access and vulnerability management solutions;the mark consists of a design resembling the letters b and t. the white background represents a transparent area and is not part of the mark.;computer software, downloadable computer programs and mobile device applications for use in controlling, monitoring, and managing user access to computer systems and software; computer software, downloadable computer programs and mobile device applications for use in providing remote information technology support services; computer software programs and hardware to assist in security and privilege management for computer operating systems, communication protocols, and software applications; computer software programs to assist in systems administration and security on operating systems that support remote access protocols; computer software programs to assist in integrating host credentials into directory services; computer software programs that provide access to multiple applications in different operating systems; computer software programs to assist in data leak protection; computer software programs to assist in cloud and virtualization monitoring and management; computer software for management of application software configuration settings; computer software for privileged account and vulnerability management; computer software for management, analytics and reporting and asset discovery and profiling in the fields of security and privilege management;beyond trust;color is not claimed as a feature of the mark.;software as a service (saas) services featuring computer software for controlling, monitoring, and managing user access to computer systems and software; software as a service (saas) services featuring computer software for use in providing remote information technology support services; computer services, technical consultation and assistance in the design, selection, implementation and use of computer networks and computer hardware and software systems for others with respect to implementing privileged access and vulnerability management systems; providing technical information in the field of computer system administration for others; computer security consulting services in the field of privileged access and vulnerability management solutions; computer consultation in the field of computer, network and software application security; non-downloadable computer software for management of application software configuration settings;.

Its status is currently believed to be active. Its class is unavailable. “BT” is believed to be currently owned by “BEYONDTRUST CORPORATION”.

Owner:
BEYONDTRUST CORPORATION
Owner Details
Description:
Computer educational and training services in the field of implementing and configuring privileged access and vulnerability management solutions;The mark consists of a design resembling the letters B and t. The white background represents a transparent area and is not part of the mark.;Computer software, downloadable computer programs and mobile device applications for use in controlling, monitoring, and managing user access to computer systems and software; computer software, downloadable computer programs and mobile device applications for use in providing remote information technology support services; computer software programs and hardware to assist in security and privilege management for computer operating systems, communication protocols, and software applications; computer software programs to assist in systems administration and security on operating systems that support remote access protocols; computer software programs to assist in integrating host credentials into directory services; computer software programs that provide access to multiple applications in different operating systems; computer software programs to assist in data leak protection; computer software programs to assist in cloud and virtualization monitoring and management; computer software for management of application software configuration settings; computer software for privileged account and vulnerability management; computer software for management, analytics and reporting and asset discovery and profiling in the fields of security and privilege management;BEYOND TRUST;Color is not claimed as a feature of the mark.;Software as a service (SAAS) services featuring computer software for controlling, monitoring, and managing user access to computer systems and software; software as a service (SAAS) services featuring computer software for use in providing remote information technology support services; computer services, technical consultation and assistance in the design, selection, implementation and use of computer networks and computer hardware and software systems for others with respect to implementing privileged access and vulnerability management systems; providing technical information in the field of computer system administration for others; computer security consulting services in the field of privileged access and vulnerability management solutions; computer consultation in the field of computer, network and software application security; non-downloadable computer software for management of application software configuration settings;
Categories: COMPUTER EDUCATIONAL TRAINING SERVICES