Brands and Their Owners
Cigent Technology Inc. contact information is shown below | |
Owner: | CIGENT TECHNOLOGY INC. |
---|---|
Owner Address: | 2211 Widman Way, Suite 150 Fort Meyers FL 33901 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
BARE METAL |
---|---|
Description: | Software in the field of information technology and cyber security, namely, software for identifying computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems and/or networks, computer threat detection, providing security compliance reporting, security intelligence and log management and providing attack protection from computer security breach attempts;METAL; |
Category: | SOFTWARE FIELD |
Brand: |
CIGENT BARE METAL |
---|---|
Description: | Recorded firmware software for identifying computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems and/or networks, computer threat detection, providing security compliance reporting, security intelligence and log management and providing attack protection from computer security breach attempts sold as a component of solid state drives;BARE METAL; |
Category: | RECORDED FIRMWARE SOFTWARE IDENTIFYING |
Brand: |
D3E |
---|---|
Description: | D THREE E;Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data via hard drives, networks or other data storage technology; |
Category: | D THREE E |
Brand: |
DYNAMIC DATA DEFENSE |
---|---|
Description: | Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data via hard drives, networks or other data storage technology; |
Category: | COMPUTER SECURITY SERVICES |
Brand: |
DYNAMIC DATA DEFENSE ENGINE |
---|---|
Description: | Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data without authorization; |
Category: | COMPUTER SECURITY SERVICES |
Brand: |
DYNAMIC DEFENSE ENGINE |
---|---|
Description: | Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data via hard drives, networks or other data storage technology; |
Category: | COMPUTER SECURITY SERVICES |
Brand: |
D³E |
---|---|
Description: | D THREE E;Color is not claimed as a feature of the mark.;Computer security services, namely, restricting unauthorized network access by unauthorized users; Computer security services, namely, restricting unauthorized access to data via hard drives, networks or other data storage technology; |
Category: | D THREE E |
Brand: |
EXTREME DATA PROTECTION |
---|---|
Description: | DATA PROTECTION;Computer security services, namely, restricting unauthorized network access by users without authorization; Computer security services, namely, restricting unauthorized access to data without authorization; Updating of computer software relating to computer security and prevention of computer risks; |
Category: | DATA PROTECTION |
Brand: |
MAKING CYBERSECURITY HABIT |
---|---|
Description: | MAKING CYBER SECURITY HABIT;Computer security services, namely, restricting unauthorized network access by individuals without appropriate credentials; |
Category: | MAKING CYBER SECURITY HABIT |