Cortez, Jessie S.

 Cortez, Jessie S. contact information is shown below
Owner:CORTEZ, JESSIE S.
Owner Address:25420 Pierson Rd. Homeland CA 92548
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byCortez, Jessie S.

Brand:

C T Z

Description:

The mark consist of the letters CTZ in which the TZ and within the opening of the letter C, the letter T has two notches in the cross of the letter. The colors of the C begin with white at the top and then subtly change to grey, then black, then navy blue, light blue and then back to white at the bottom. The colors of the letters TZ begin with white at the top and then subtly change to grey, then black, then navy blue, light blue, white, navy blue, and finally black. All of the letters have a black outlining and grey shading. All of the above is on a white background that is not being claimed as part of the mark.;Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;CORTEZ;The color(s) white, gray, black, navy blue, and light blue is/are claimed as a feature of the mark.;

Category: MARK CONSIST
Brand:

CENTER ZERO

Description:

Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;

Category: COMPUTER SECURITY SOFTWARE RESTRICTING
Brand:

CTZ CENTER ZERO

Description:

Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;

Category: COMPUTER SECURITY SOFTWARE RESTRICTING