ON DEFEND

Brand Owner (click to sort) Address Description
ONDEFEND ONDEFEND HOLDINGS 4215 Southpoint Blvd., Ste. 260 Jacksonville FL 32216 ON DEFEND;Computer consultation in the field of computer security; Computer consultation in the field of computer and internet security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of computer virus and scanning software; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to hard drives, networks, websites; Computer security services, namely, restricting unauthorized network access by users without credentials;
ONDEFEND OnDefend Solutions P.O. Box 551028 Jacksonville FL 32255 ON DEFEND;Computer consultation in the field of computer security; Computer consultation in the field of computer and internet security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of computer virus and scanning software; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to hard drives, networks, websites; Computer security services, namely, restricting unauthorized network access by users without credentials;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A control of gobos defend by records in the gobo. The gobos are formed by menued shapes.