Birch Cline Technologies, Inc.

 Birch Cline Technologies, Inc. contact information is shown below
Owner:BIRCH CLINE TECHNOLOGIES, INC.
Owner Address:3414 Greathouse Rd. Waxahachie TX 75167
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byBirch Cline Technologies, Inc.

Brand:

BC

Description:

The mark consists of two swords, including hilts, crossed behind a shield. The stylized letters B and C are prominently displayed on the face of the shield. The shield consists of four differently-shaded quadrants; no shade in the top left quadrant, light shade in the top right quadrant, medium shade in the bottom left quadrant, and dark shade in the bottom right quadrant.;Recorded computer software for computer security, computer network security, information security, data security, and firewall security purposes; Downloadable computer software for scanning, monitoring, and securing computer networks and computing endpoints for cybersecurity purposes;BIRCH CLINE;Color is not claimed as a feature of the mark.;Application service provider (ASP) featuring software for use in computer and network security; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer systems analysis; Consulting services in the design and implementation of computer-based information systems for businesses; Electronic monitoring of personally identifying information to detect identity theft via the internet; Monitoring of computer systems for detecting unauthorized access or data breach; Technical support, namely, monitoring technological functions of computer network systems; Technological planning and consulting services in the field of computer, data, and network security; Testing, analysis, and evaluation of computer, data, and network systems to assure compliance with cybersecurity industry standards; Consulting services in the field of software as a service (SAAS); Software as a service (SAAS) services featuring software for security information and event management (SIEM);

Category: