Ontic Technologies, Inc.

 Ontic Technologies, Inc. contact information is shown below
Owner:ONTIC TECHNOLOGIES, INC.
Owner Address:1005 W 38th Street, #3 Austin TX 78705
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byOntic Technologies, Inc.

Brand:

LET'S MAKE NOTHING HAPPEN TOGETHER

Description:

LET US MAKE NOTHING HAPPEN TOGETHER;Software as a service (SaaS) in the nature of online non-downloadable software used in protective intelligence efforts to conduct relational analysis of client provided data, as well as that which is obtained from the systems listening and monitoring capabilities regarding social media sites, local and international news, public record feeds and business intelligence services to then create, manage and organize resulting data for use by security professionals to identify and assess potential risks and track behavioral patterns;

Category: LET US MAKE NOTHING HAPPEN
Brand:

MACHINE ASSISTED PROTECTIVE INTELLIGENCE

Description:

PROTECTIVE INTELLIGENCE;Software as a service (SaaS) in the nature of online non-downloadable software used in protective intelligence efforts to conduct relational analysis of client provided data, as well as that which is obtained from the systems listening and monitoring capabilities regarding social media sites, local and international news, public record feeds and business intelligence services to then create, manage and organize resulting data for use by security professionals to identify and assess potential risks and track behavioral patterns;

Category: PROTECTIVE INTELLIGENCE
Brand:

ONTIC

Description:

The mark consists of TWO ANGULAR SHAPES THAT FACE ONE ANOTHER; THE ANGLE ON THE LEFT IS THE LARGER OF THE TWO; THE ANGLES TOUCH AT THE BOTTOM OF EACH PLANE TO FORM A SQUARE IN THE CENTER; TO THE RIGHT OF THE DESIGN IS THE WORD ONTIC.;Color is not claimed as a feature of the mark.;Software as a service (SaaS) in the nature of online non-downloadable software used in protective intelligence efforts to conduct relational analysis of client provided data, as well as that which is obtained from the systems listening and monitoring capabilities regarding social media sites, local and international news, public record feeds and business intelligence services to then create, manage and organize resulting data for use by security professionals to identify and assess potential risks and track behavioral patterns;

Category: