S

Welcome to the Brand page for “S”, which is offered here for The mark consists of two angled geometric shapes appearing to form a stylized letter s.;enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting;color is not claimed as a feature of the mark.;providing on-line non-downloadable enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; providing information in the field of network and internet security in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network;.

Its status is currently believed to be active. Its class is unavailable. “S” is believed to be currently owned by “SWIMLANE, INC.”


Owner:
SWIMLANE, INC.
Owner Details
Description:
The mark consists of two angled geometric shapes appearing to form a stylized letter S.;Enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting;Color is not claimed as a feature of the mark.;Providing on-line non-downloadable enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; providing information in the field of network and Internet security in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network;
Categories: