SURF

Welcome to the Brand page for “SURF”, which is offered here for The mark consists of the word surf in blue capital stylized lettering, with the s, the r, and the f being solid colored, while the u is half light shaded on the right side stem, and half darker shaded on the left side stem. in the gap of the letter u there is a blue circle.;downloadable computer software for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; downloadable zero trust software used for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; downloadable computer software for monitoring and controlling communication between computers and automated machine systems; downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable computer software for use in analyzing and monitoring computer networks and network access; downloadable computer software for diagnosing industrial and business performance issues; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data;the color(s) blue is/are claimed as a feature of the mark.;software as a service (saas) services featuring software used for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; software as a service (saas) services featuring zero trust software used for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; software as a service (saas) services featuring software for monitoring and controlling communication between computers and automated machine systems; software as a service (saas) services featuring software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; software as a service (saas) services featuring software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; software as a service (saas) services featuring software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; software as a service (saas) services featuring software for use in analyzing and monitoring computer networks and network access; software as a service (saas) services featuring software for diagnosing industrial and business performance issues; software as a service (saas) services featuring software for providing operational intelligence, business analytics, security information, and troubleshooting based on data;.

Its status is currently believed to be active. Its class is unavailable. “SURF” is believed to be currently owned by “SURF Security Inc.”

Owner:
SURF SECURITY INC.
Owner Details
Description:
The mark consists of the word SURF in blue capital stylized lettering, with the S, the R, and the F being solid colored, while the U is half light shaded on the right side stem, and half darker shaded on the left side stem. In the gap of the letter U there is a blue circle.;Downloadable computer software for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; downloadable zero trust software used for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; downloadable computer software for monitoring and controlling communication between computers and automated machine systems; downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable computer software for use in analyzing and monitoring computer networks and network access; downloadable computer software for diagnosing industrial and business performance issues; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data;The color(s) blue is/are claimed as a feature of the mark.;Software as a service (SAAS) services featuring software used for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; Software as a service (SAAS) services featuring zero trust software used for providing surveillance and monitoring, computer security, cyber security, web browser, web browsing, cyber security control, cyber security warning, data security, managing business processes, computer authentication services, and enhancement of business productivity; Software as a service (SAAS) services featuring software for monitoring and controlling communication between computers and automated machine systems; Software as a service (SAAS) services featuring software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; Software as a service (SAAS) services featuring software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; Software as a service (SAAS) services featuring software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; Software as a service (SAAS) services featuring software for use in analyzing and monitoring computer networks and network access; Software as a service (SAAS) services featuring software for diagnosing industrial and business performance issues; Software as a service (SAAS) services featuring software for providing operational intelligence, business analytics, security information, and troubleshooting based on data;
Categories: