DEFEND

Brand Owner (click to sort) Address Description
D-FEND BIO HUMA NETICS, INC. 1331 W Houston Ave Gilbert AZ 85233 DEFEND;DEFEND;Fertilizers;
D-FEND GE HEALTHCARE FINLAND OY 3030 Ohmeda Drive Waukesha WI 537077550 DEFEND;Water traps for separating liquid and bacterial/viral components from a gas sample withdrawn from a breathing gas of a patient before conducting the gas sample to a medical gas analyzer;
DEFENDIS WINFIELD SOLUTIONS 4001 Lexington Avenue North Arden Hills MN 55126 DEFEND THIS;Seed treatment chemicals for agricultural use;
DFND DFND TECHNOLOGIES 1330 18th Street Manhattan Beach CA 90266 DEFEND;Clothing, namely, shirts, pants, shorts, t-shirts, jackets, tops, bottoms, hats, sweaters, and sweatshirts;Compression garments, namely, compression socks, leggings, stockings, pants, riding shorts, shorts, trousers, shorts and sleeves;
DISTRICT DEFEND BOOZ ALLEN HAMILTON INC. 8283 Greensboro Drive McLean VA 22102 DEFEND;Design and development of computer software for secure network operations; providing online non-downloadable software for secure network operations; maintenance of computer software relating to computer security and prevention of computer risks; providing online non-downloadable software for changing the settings on a mobile device using contextual triggers including physical location, network connectivity status, time-based permissions, and individual employee characteristics; providing online non-downloadable software for protecting data through the use of location;
DĀ°FEND PROPEX, INC. 6025 Lee Highway, Suite 425 Chattanooga TN 37422 DEFEND;Synthetic fibers that impart fire retardancy and/or heat resistance in a fabric;
IDEFEND INVISUS 1276 S. 820 E. Suite 140 American Fork UT 84003 I DEFEND;Identity monitoring and consultation services in the field of personal and business information theft and identity theft, namely, electronic monitoring of personal and business identifying information to detect identity theft, and computer security services for protecting data and information from unauthorized access via electronic monitoring of credit reports to detect fraud, and electronic monitoring of personally identifying financial information to detect fraud and identity theft via the Internet for the purposes of identity restoration;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A control of gobos defend by records in the gobo. The gobos are formed by menued shapes.