PURPLE RIDGE SECURITY

Welcome to the Brand page for “PURPLE RIDGE SECURITY”, which is offered here for The mark consists of the wording purpleridge security arranged in three lines and rendered in white, over a mainly solid purple background, with stylistic profile depictions of mountain peaks and ranges rendered in black at the bottom of the background.;the color(s) purple, white and black is/are claimed as a feature of the mark.;purpleridge or security;computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security threat analysis for protecting data; computer network security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; rental of computers relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks;.

Its status is currently believed to be active. Its class is unavailable. “PURPLE RIDGE SECURITY” is believed to be currently owned by “Ridge Security Technology Inc.”

Owner:
RIDGE SECURITY TECHNOLOGY INC.
Owner Details
Description:
The mark consists of the wording PurpleRIDGE SECURITY arranged in three lines and rendered in white, over a mainly solid purple background, with stylistic profile depictions of mountain peaks and ranges rendered in black at the bottom of the background.;The color(s) purple, white and black is/are claimed as a feature of the mark.;PURPLERIDGE OR SECURITY;Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer network security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Rental of computers relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks;
Categories: