Brands and Their Owners
Birch Cline Technologies, Inc. contact information is shown below | |
Owner: | BIRCH CLINE TECHNOLOGIES, INC. |
---|---|
Owner Address: | 3414 Greathouse Rd. Waxahachie TX 75167 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
BC |
---|---|
Description: | The mark consists of two swords, including hilts, crossed behind a shield. The stylized letters B and C are prominently displayed on the face of the shield. The shield consists of four differently-shaded quadrants; no shade in the top left quadrant, light shade in the top right quadrant, medium shade in the bottom left quadrant, and dark shade in the bottom right quadrant.;Recorded computer software for computer security, computer network security, information security, data security, and firewall security purposes; Downloadable computer software for scanning, monitoring, and securing computer networks and computing endpoints for cybersecurity purposes;BIRCH CLINE;Color is not claimed as a feature of the mark.;Application service provider (ASP) featuring software for use in computer and network security; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer systems analysis; Consulting services in the design and implementation of computer-based information systems for businesses; Electronic monitoring of personally identifying information to detect identity theft via the internet; Monitoring of computer systems for detecting unauthorized access or data breach; Technical support, namely, monitoring technological functions of computer network systems; Technological planning and consulting services in the field of computer, data, and network security; Testing, analysis, and evaluation of computer, data, and network systems to assure compliance with cybersecurity industry standards; Consulting services in the field of software as a service (SAAS); Software as a service (SAAS) services featuring software for security information and event management (SIEM); |
Category: |