Brands and Their Owners
MANX CAPITAL GROUP, INC. contact information is shown below | |
Owner: | MANX CAPITAL GROUP, INC. |
---|---|
Owner Address: | 251 Little Falls Drive Wilmington DE 19807 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
CONTEXT |
---|---|
Description: | Computer software for network forensics; computer software for monitoring and analysis of computer network traffic, associated security events and artifacts for the purposes of information gathering, legal evidence, or intrusion detection; computer networking hardware;Computer services, namely, network forensics services; computer services, namely, monitoring and analysis of computer network traffic, associated security events and artifacts for the purposes of information gathering, legal evidence, or intrusion detection; providing temporary use of non-downloadable cloud-based software for network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic, associated security events and artifacts for the purposes of information gathering, legal evidence, or intrusion detection; |
Category: | COMPUTER SOFTWARE NETWORK FORENSICS |
Brand: |
FINMON |
---|---|
Description: | Software as a service (SAAS) services featuring software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same; Providing temporary use of on-line non-downloadable software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same; |
Category: | SOFTWARE AS SERVICE SAAS |
Brand: |
FINMON |
---|---|
Description: | Software as a service (SAAS) services featuring software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same; Providing temporary use of on-line nondownloadable software for monitoring financial transactions, detection of possible money laundering and suspicious transactions, and providing reports regarding same; |
Category: | SOFTWARE AS SERVICE SAAS |
Brand: |
GICH |
---|---|
Description: | Transmission and delivery of digital data;Operating an online marketplace for buyers and sellers of goods in the field of digital data files;Providing an interactive website featuring technology that allows users to upload and download digital data, images, photos, videos and text; |
Category: | TRANSMISSION DELIVERY DIGITAL |
Brand: |
HUNTER |
---|---|
Description: | computer software for identification of user, application, system and network anomalies; computer software for analysis of user, application, system and network data; computer software for detection and isolation of cyber threats; computer software for security threat analysis; computer networking hardware;Computer security threat analysis for protecting data; Providing temporary use of non-downloadable cloud-based software for identification of user, application, system and network anomalies; Providing temporary use of non-downloadable cloud-based software for detection and isolation of cyber threats; computer software for security threat analysis; Providing temporary use of non-downloadable cloud-based software for security threat analysis; |
Category: | COMPUTER SOFTWARE IDENTIFICATION |
Brand: |
KOMA |
---|---|
Description: | Goggles for sports; motorcycle goggles; snow goggles; swimming goggles; scuba goggles; eyewear; sunglasses; sports helmets; protective helmets; mountain biking helmets; snowboarding helmets; ski helmets;Gloves for sports, namely, gloves for football, baseball, batting, hockey, boxing, running, fencing, rowing, skateboarding, windsurfing, waterskiing, handball, bowling, swimming, karate, weight lifting, yoga, working out; golf gloves;Clothing for golf, sports, mountain biking, cycling, snow, namely, tops and bottoms; headwear and footwear for golf, sports, mountain biking, cycling, snow; gloves; ski gloves; snowboard gloves; mountain biking gloves; cycling gloves; |
Category: | GOGGLES SPORTS |
Brand: |
KOMA |
---|---|
Description: | Golf gloves;Color is not claimed as a feature of the mark.; |
Category: | GOLF GLOVES |
Brand: |
POWERED BY CONTEXT. DRIVEN BY DATA. |
---|---|
Description: | Computer software for computer network forensics; computer software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering, or intrusion detection; computer networking hardware;Computer services, namely, computer network forensics services; computer services, namely, monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering, or intrusion detection; providing temporary use of non-downloadable cloud-based software for computer network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering, or intrusion detection; |
Category: | COMPUTER SOFTWARE COMPUTER NETWORK |
Brand: |
PROTECTING TODAY. BUILDING TOMORROW. |
---|---|
Description: | Computer software for protection of electronic data from unintended or unauthorized access, change or destruction; computer software for identification of computer user, application, system and network anomalies; computer software for analysis of computer user, application, system and network data; computer software for detection and isolation of cyber threats; computer software for computer network security threat analysis; computer software for computer network forensics; computer software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; computer anti-virus software; next-generation computer anti-virus software; computer networking hardware;Software as a service (SAAS) services featuring software for protection of electronic data from unintended or unauthorized access, change or destruction; providing temporary use of non-downloadable cloud-based software for identification of computer user, application, system and network anomalies; providing temporary use of non-downloadable cloud-based software for detection and isolation of cyber threats; providing temporary use of non-downloadable cloud-based software for computer network security threat analysis; providing temporary use of non-downloadable cloud-based software for computer network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; providing temporary use of non-downloadable computer anti-virus software and next-generation computer anti-virus software; computer security threat analysis for protecting data; computer services, namely, computer network forensics services; computer services, namely, monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; technical support services, namely, installation, administration and troubleshooting of computer applications; |
Category: | COMPUTER SOFTWARE PROTECTION |
Brand: |
R RESECURITY |
---|---|
Description: | The mark consists of a stylized letter R within a solid shield to the left of the characters RESECURITY with a vertical line between RE and SECURITY.;Software for protection of electronic data from unintended or unauthorized access, change or destruction;Color is not claimed as a feature of the mark.;SECURITY;Software as a service (SAAS) services featuring software for protection of electronic data from unintended or unauthorized access, change or destruction; Updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; Technical support services, namely, installation, administration, and troubleshooting of computer applications; |
Category: |