NN

Welcome to the Brand page for “NN”, which is offered here for The mark consists of the stylized letters nn in a stylized rhombus shape.;downloadable computer security software for protection of wireless networks, securing computer networks, protection against computer network intrusions, protection of peripherals and other computer devices connected to a computer network, and protection of peripherals and other computer devices using a wireless connection to a computer network; downloadable computer software for ensuring the security of electronic mail; downloadable computer software for the remote control of safety apparatus; materials for use in connection with computer security software, computer hardware for use in connection with computer security software; downloadable computer software for computer network monitoring and intrusion detection systems; downloadable computer software for detecting viruses, malware, spyware and unauthorized access; downloadable computer software for the extraction and analysis of data used to identify and report malicious files; downloadable computer software for detecting, identifying, monitoring, reporting and analyzing incidents involving cybersecurity, threats, malicious software, unauthorized software, network attacks and breaches in computer networks; downloadable computer software for detecting and warning in real time of cyber threats and system alterations; downloadable computer software for real-time goods inventories and network monitoring; downloadable computer software enabling use of machine learning to detect network baseline discrepancies, anomalies and functions; downloadable computer software for using machine intelligence learning of goods to detect non-standard operation of operational technology, interconnected devices on a computer network and devices that connect to the internet and that may be discovered on a computer network;updating of computer software relating to computer security and the prevention of computer risks; maintenance of computer software relating to computer security and the prevention of computer risks; design and development of electronic data security systems; data security consultancy; internet security consultancy; computer security services for protection against illegal access to networks; consultancy in the field of security software; rental of internet security computer software programs; software as a service (saas) services featuring internet security programs for protection of wireless networks, securing computer networks, protection against computer network intrusions, protection of peripherals and other computer devices connected to a computer network, and protection of peripherals and other computer devices using a wireless connection to a computer network; software as a service (saas) services featuring internet security programs for ensuring the security of electronic mail; software as a service (saas) services featuring internet security programs for the remote control of safety apparatus; software as a service (saas) services featuring internet security programs for computer network monitoring and intrusion detection systems; software as a service (saas) services featuring internet security programs for detecting viruses, malware, spyware and unauthorized access; software as a service (saas) services featuring internet security programs for the extraction and analysis of data used to identify and report malicious files; software as a service (saas) services featuring internet security programs for detecting, identifying, monitoring, reporting and analyzing incidents involving cybersecurity, threats, malicious software, unauthorized software, network attacks and breaches in computer networks; software as a service (saas) services featuring internet security programs for detecting and warning in real time of cyber threats and system alterations; software as a service (saas) services featuring internet security programs for real-time goods inventories and network monitoring; downloadable computer software enabling use of machine learning to detect network baseline discrepancies, anomalies and functions; software as a service (saas) services featuring internet security programs for using machine intelligence learning of goods to detect non-standard operation of operational technology, interconnected devices on a computer network and devices that connect to the internet and that may be discovered on a computer network; programming of internet security software; design and development of internet security programs; consultancy in the field of computer security; computer security technical advice services; professional technical advice with respect to computer security; computer programming services for electronic data security; technical support services for computer software, troubleshooting in the nature of diagnosing computer hardware and software problems; development of software for secure network operation; computer network vulnerability assessment with respect to information security; computer consulting with respect to computer system security, consulting concerning the maintenance and updating of computer security software;.

Its status is currently believed to be active. Its class is unavailable. “NN” is believed to be currently owned by “Nozomi Networks Sagl”.


Owner:
NOZOMI NETWORKS SAGL
Owner Details
Description:
The mark consists of the stylized letters NN in a stylized rhombus shape.;Downloadable computer security software for protection of wireless networks, securing computer networks, protection against computer network intrusions, protection of peripherals and other computer devices connected to a computer network, and protection of peripherals and other computer devices using a wireless connection to a computer network; downloadable computer software for ensuring the security of electronic mail; downloadable computer software for the remote control of safety apparatus; materials for use in connection with computer security software, computer hardware for use in connection with computer security software; downloadable computer software for computer network monitoring and intrusion detection systems; downloadable computer software for detecting viruses, malware, spyware and unauthorized access; downloadable computer software for the extraction and analysis of data used to identify and report malicious files; downloadable computer software for detecting, identifying, monitoring, reporting and analyzing incidents involving cybersecurity, threats, malicious software, unauthorized software, network attacks and breaches in computer networks; downloadable computer software for detecting and warning in real time of cyber threats and system alterations; downloadable computer software for real-time goods inventories and network monitoring; downloadable computer software enabling use of machine learning to detect network baseline discrepancies, anomalies and functions; downloadable computer software for using machine intelligence learning of goods to detect non-standard operation of operational technology, interconnected devices on a computer network and devices that connect to the Internet and that may be discovered on a computer network;updating of computer software relating to computer security and the prevention of computer risks; maintenance of computer software relating to computer security and the prevention of computer risks; design and development of electronic data security systems; data security consultancy; Internet security consultancy; computer security services for protection against illegal access to networks; consultancy in the field of security software; rental of Internet security computer software programs; software as a service (SAAS) services featuring Internet security programs for protection of wireless networks, securing computer networks, protection against computer network intrusions, protection of peripherals and other computer devices connected to a computer network, and protection of peripherals and other computer devices using a wireless connection to a computer network; software as a service (SAAS) services featuring Internet security programs for ensuring the security of electronic mail; software as a service (SAAS) services featuring Internet security programs for the remote control of safety apparatus; software as a service (SAAS) services featuring Internet security programs for computer network monitoring and intrusion detection systems; software as a service (SAAS) services featuring Internet security programs for detecting viruses, malware, spyware and unauthorized access; software as a service (SAAS) services featuring Internet security programs for the extraction and analysis of data used to identify and report malicious files; software as a service (SAAS) services featuring Internet security programs for detecting, identifying, monitoring, reporting and analyzing incidents involving cybersecurity, threats, malicious software, unauthorized software, network attacks and breaches in computer networks; software as a service (SAAS) services featuring Internet security programs for detecting and warning in real time of cyber threats and system alterations; software as a service (SAAS) services featuring Internet security programs for real-time goods inventories and network monitoring; downloadable computer software enabling use of machine learning to detect network baseline discrepancies, anomalies and functions; software as a service (SAAS) services featuring Internet security programs for using machine intelligence learning of goods to detect non-standard operation of operational technology, interconnected devices on a computer network and devices that connect to the Internet and that may be discovered on a computer network; programming of Internet security software; design and development of Internet security programs; consultancy in the field of computer security; computer security technical advice services; professional technical advice with respect to computer security; computer programming services for electronic data security; technical support services for computer software, troubleshooting in the nature of diagnosing computer hardware and software problems; development of software for secure network operation; computer network vulnerability assessment with respect to information security; computer consulting with respect to computer system security, consulting concerning the maintenance and updating of computer security software;
Categories: