Brands and Their Owners
Welcome to the Brand page for “RING”, which is offered here for Downloadable computer, network, and internet security software; downloadable security software for detecting, blocking, and intercepting viruses, malware, spyware, and unauthorized access; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for use in analysis and reporting of firewall log data; downloadable fraud protection software; downloadable privacy control software; downloadable computer software for providing secure access by authenticated users to computer and communication networks and applications; downloadable mobile applications enabling secure access to computer and communication networks and applications; downloadable computer software for data protection and data security; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; transmitter and receiver used to locate lost pets; computer hardware and downloadable computer software for tracking the location of pets; computer hardware and downloadable software for users to locate, monitor, and track the position of personal property; gps tracking devices for locating, monitoring, and tracking the position of personal property; electronic devices for users to locate, monitor, and track personal property programmed to use global positioning systems (gps) and cellular communications; transmitter and receiver to enable users to locate, monitor, and track personal property; downloadable software for users to monitor position and range of location-tracking devices used in connection with internet of things (iot) enabled devices for locating, monitoring, and tracking personal property;consulting services in the field of public safety, disaster prevention consultancy; monitoring of environmental sensors in homes, businesses, and other facilities for safety purposes, disaster detection, prevention, and warning;cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security services, providing secure network access in the nature of restricting and controlling access privileges of users of computing resources based on assigned credentials for the purposes of mitigating cybersecurity risks; computer services, providing unauthorized user and unauthorized software intrusion detection and protection; computer security services, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of computer network access, computer viruses, and computer security threats; computer services, data recovery services; computer services, detecting of computer viruses and computer security threats; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; development, updating, and maintenance of software for networks and standalone computers in the fields of security, and anti-virus protection and monitoring; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access; monitoring of computer systems for detecting unauthorized access or data breach, and to ensure proper functioning; software as a service (saas) services featuring network security software; software as a service (saas) services featuring software for data protection and data security; monitoring of computer systems and databases for security purposes in the nature of protecting data and information from unauthorized access; computerized security services, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of computer network access or activity in the nature of protecting data and information from unauthorized access; providing user authentication services using online non-downloadable software for establishing and transmitting security credentials between computers; maintenance of computer software relating to computer security and prevention of computer risks; providing a web site featuring technology that enables users to track, monitor and locate pets; computer services, creating, maintaining, designing, and implementing websites for others to enable users to locate, monitor, and track the position of personal property; providing technology information in the field of wearable technological products for users to locate, monitor, and track personal property; providing a web site featuring technology that enables users to locate, monitor, and track personal property; temporary provision of non-downloadable computer software for location specific-information for disaster prevention and emergency disaster response; monitoring of computer systems for security purposes, detecting unauthorized access or data breach; fraud and identity theft protection services, electronic monitoring of personally identifying information to detect identity theft via the internet;.
Its status is currently believed to be active. Its class is unavailable. “RING” is believed to be currently owned by “AMAZON TECHNOLOGIES, INC.”
Owner: |
AMAZON TECHNOLOGIES, INC.
Owner Details |
---|---|
Description: |
Downloadable computer, network, and Internet security software; downloadable security software for detecting, blocking, and intercepting viruses, malware, spyware, and unauthorized access; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for use in analysis and reporting of firewall log data; downloadable fraud protection software; downloadable privacy control software; downloadable computer software for providing secure access by authenticated users to computer and communication networks and applications; downloadable mobile applications enabling secure access to computer and communication networks and applications; downloadable computer software for data protection and data security; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; transmitter and receiver used to locate lost pets; computer hardware and downloadable computer software for tracking the location of pets; computer hardware and downloadable software for users to locate, monitor, and track the position of personal property; GPS tracking devices for locating, monitoring, and tracking the position of personal property; Electronic devices for users to locate, monitor, and track personal property programmed to use global positioning systems (GPS) and cellular communications; transmitter and receiver to enable users to locate, monitor, and track personal property; downloadable software for users to monitor position and range of location-tracking devices used in connection with internet of things (IOT) enabled devices for locating, monitoring, and tracking personal property;Consulting services in the field of public safety, disaster prevention consultancy; monitoring of environmental sensors in homes, businesses, and other facilities for safety purposes, disaster detection, prevention, and warning;Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security services, providing secure network access in the nature of restricting and controlling access privileges of users of computing resources based on assigned credentials for the purposes of mitigating cybersecurity risks; computer services, providing unauthorized user and unauthorized software intrusion detection and protection; computer security services, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of computer network access, computer viruses, and computer security threats; computer services, data recovery services; computer services, detecting of computer viruses and computer security threats; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; development, updating, and maintenance of software for networks and standalone computers in the fields of security, and anti-virus protection and monitoring; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access; monitoring of computer systems for detecting unauthorized access or data breach, and to ensure proper functioning; software as a service (SaaS) services featuring network security software; software as a service (SaaS) services featuring software for data protection and data security; monitoring of computer systems and databases for security purposes in the nature of protecting data and information from unauthorized access; computerized security services, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of computer network access or activity in the nature of protecting data and information from unauthorized access; providing user authentication services using online non-downloadable software for establishing and transmitting security credentials between computers; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a web site featuring technology that enables users to track, monitor and locate pets; Computer services, creating, maintaining, designing, and implementing websites for others to enable users to locate, monitor, and track the position of personal property; providing technology information in the field of wearable technological products for users to locate, monitor, and track personal property; providing a web site featuring technology that enables users to locate, monitor, and track personal property; temporary provision of non-downloadable computer software for location specific-information for disaster prevention and emergency disaster response; Monitoring of computer systems for security purposes, detecting unauthorized access or data breach; fraud and identity theft protection services, electronic monitoring of personally identifying information to detect identity theft via the internet;
|
Categories: | DOWNLOADABLE COMPUTER |