Brands and Their Owners
Welcome to the Brand page for “DRUVSTAR”, which is offered here for Education services, providing classes, seminars, lectures, workshops, and training in the field of cybersecurity risk management;the mark consists of an incomplete, inverted pentagon shape made up of a series of four concentric incomplete pentagon shapes with a small triangle at the center; the lines creating the incomplete pentagon shapes are not connected at the bottom, but rather are broken and have solid circles at each end; the outside line has two small breaks at the top and one break on the left-hand side. druvstar is in a stylized font below the design; with druv being a lighter shade than star.;cybersecurity services in the nature of restricting unauthorized access to computer systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; technology consultation in the field of cybersecurity; software as a service (saas) services featuring software for managed detection and response to cybersecurity risks;.
Its status is currently believed to be active. Its class is unavailable. “DRUVSTAR” is believed to be currently owned by “Arete Security Inc.”
Owner: |
ARETE SECURITY INC.
Owner Details |
---|---|
Description: |
Education services, providing classes, seminars, lectures, workshops, and training in the field of cybersecurity risk management;The mark consists of an incomplete, inverted pentagon shape made up of a series of four concentric incomplete pentagon shapes with a small triangle at the center; the lines creating the incomplete pentagon shapes are not connected at the bottom, but rather are broken and have solid circles at each end; the outside line has two small breaks at the top and one break on the left-hand side. DRUVSTAR is in a stylized font below the design; with DRUV being a lighter shade than STAR.;Cybersecurity services in the nature of restricting unauthorized access to computer systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; technology consultation in the field of cybersecurity; software as a service (SAAS) services featuring software for managed detection and response to cybersecurity risks;
|
Categories: | EDUCATION SERVICES |