Brands and Their Owners
Absolute Software Corporation contact information is shown below | |
Owner: | ABSOLUTE SOFTWARE CORPORATION |
---|---|
Owner Address: | Suite 1400, 1055 Dunsmuir Street Vancouver, B.C. V7X1K8 Canada |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ABSOLUTE |
---|---|
Description: | Computer software for tracking and managing information, installation and system configuration, installation and deployment of software updates, encryption, access control, monitoring and protection of information in the field of generation of security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures;Installation, implementation and ongoing support in the nature of troubleshooting of software and hardware problems and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and ongoing support in the nature of troubleshooting of software and hardware problems and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; |
Category: | COMPUTER SOFTWARE TRACKING |
Brand: |
ABSOLUTE |
---|---|
Description: | The mark consists of the term ABSOLUTE appearing in stylized letters with the letter A represented by an inverted V with a solid, contrasting line running parallel to the left of the inverted V.;Computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; computer software for tracking and managing information for use in the field of information technology service management; computer software for tracking and managing information for use in the field of information technology asset management for mobile devices; computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; computer security software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMS) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith;Color is not claimed as a feature of the mark.;(Based on Section 44) Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, namely, monitoring services for security purposes wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices;Installation, implementation and maintenance of computer software for use in the field of information technology asset and lifecycle management and power management; installation, implementation and maintenance of computer software for use in the field of information technology service management; installation, implementation and maintenance of computer software for use in the field of information technology asset management for mobile devices; installation, implementation and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; |
Category: |