Grey Wolf Security, LLC

 Grey Wolf Security, LLC contact information is shown below
Owner:GREY WOLF SECURITY, LLC
Owner Address:161 Fort Evans Rd NE Ste 325 Leesburg VA 20176
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byGrey Wolf Security, LLC

Brand:

GREY WOLF SECURITY

Description:

SECURITY;Computer forensic services; Computer system design services; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the fields of forensic science; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of on-line computer software systems; Monitoring of computer systems for detecting unauthorized access or data breach; Technical support services, namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; Technical support services, namely, troubleshooting of computer software problems; IT consulting services;

Category: SECURITY
Brand:

GREY WOLF SECURITY

Description:

The mark consists of a blue shield emblem of a wolf to the left and the phrase grey wolf security to the right on a black background. The emblem shows the right side of the grey wolf's head with a red eye and some blue fur on its neck framed into a blue shield. the backdrop of the framed shield is black with a pattern of vertical blue lines. the phrase grey wolf security is capitalized, divided into two lines, aligned to the right. the words grey wolf are on top right, gray in color, with small blue circles in letters r and o. the word security is on the bottom right, blue in color.;The color(s) black, grey, red and blue is/are claimed as a feature of the mark.;SECURITY;Computer forensic services; Computer system design services; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the fields of forensic science; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of on-line computer software systems; Monitoring of computer systems for detecting unauthorized access or data breach; Technical support services, namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; Technical support services, namely, troubleshooting of computer software problems; IT consulting services;

Category: