FindOwnerSearch
Brands and Their Owners
Ontic Technologies, Inc. contact information is shown below | |
Owner: | ONTIC TECHNOLOGIES, INC. |
---|---|
Owner Address: | 1005 W 38th Street, #3 Austin TX 78705 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
LET'S MAKE NOTHING HAPPEN TOGETHER |
---|---|
Description: | LET US MAKE NOTHING HAPPEN TOGETHER;Software as a service (SaaS) in the nature of online non-downloadable software used in protective intelligence efforts to conduct relational analysis of client provided data, as well as that which is obtained from the systems listening and monitoring capabilities regarding social media sites, local and international news, public record feeds and business intelligence services to then create, manage and organize resulting data for use by security professionals to identify and assess potential risks and track behavioral patterns; |
Category: | LET US MAKE NOTHING HAPPEN |
Brand: |
MACHINE ASSISTED PROTECTIVE INTELLIGENCE |
---|---|
Description: | PROTECTIVE INTELLIGENCE;Software as a service (SaaS) in the nature of online non-downloadable software used in protective intelligence efforts to conduct relational analysis of client provided data, as well as that which is obtained from the systems listening and monitoring capabilities regarding social media sites, local and international news, public record feeds and business intelligence services to then create, manage and organize resulting data for use by security professionals to identify and assess potential risks and track behavioral patterns; |
Category: | PROTECTIVE INTELLIGENCE |
Brand: |
ONTIC |
---|---|
Description: | The mark consists of TWO ANGULAR SHAPES THAT FACE ONE ANOTHER; THE ANGLE ON THE LEFT IS THE LARGER OF THE TWO; THE ANGLES TOUCH AT THE BOTTOM OF EACH PLANE TO FORM A SQUARE IN THE CENTER; TO THE RIGHT OF THE DESIGN IS THE WORD ONTIC.;Color is not claimed as a feature of the mark.;Software as a service (SaaS) in the nature of online non-downloadable software used in protective intelligence efforts to conduct relational analysis of client provided data, as well as that which is obtained from the systems listening and monitoring capabilities regarding social media sites, local and international news, public record feeds and business intelligence services to then create, manage and organize resulting data for use by security professionals to identify and assess potential risks and track behavioral patterns; |
Category: |