Trademarks owned by Bitvoyant | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned Bitvoyant owned Bitvoyant

Trademarks owned by 'Bitvoyant'

Summary of page content
2016-01-07
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for monitoring wireless signals and indicators of potential network compromise or unsanctioned activities in the field of cyber defense and business intelligence by users of computer networks; computer software platforms for business intelligence, situational awareness, and coordination to subsystems, namely, software that alerts network users to potential security threats, for use in the field of cyber defense and business intelligence by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for monitoring wireless signals and indicators of potential network compromise or unsanctioned activities in the field of cyber defense and business intelligence by users of computer networks; platform as a service (paas) featuring computer software platforms for business intelligence, situational awareness, and coordination to subsystems, namely, software that alerts network users to potential security threats, for use in the field of cyber defense and business intelligence by users of computer networks
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2017-07-11
2020-05-31
WATCHKEEPER Bitvoyant
2016-01-07
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for network deception and threat misdirection as a security measure, tactic, technique or procedure for users of computer network for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for network deception and threat misdirection as a security measure, tactic, technique or procedure for users of computer network for use in the field of cyber defense by users of computer networks
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-09-19
2020-05-31
management solutions health care sports network compliance services life manager customer business technologies center orthopedic therapy prevention maintenance pro protection
2016-01-07
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for network deception and threat misdirection as a security measure, tactic, technique or procedure for users of computer network for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for network deception and threat misdirection as a security measure, tactic, technique or procedure for users of computer network for use in the field of cyber defense by users of computer networks
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2017-07-11
2020-05-31
DECEPTOR Bitvoyant
2016-01-08
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for a software interface solutions that enable full control of packet contents on a local network, for use in the field of cyber defense by users of computer network
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for inline appliance-based service solutions that enable full control of packet contents on a local network, for use in the field of cyber defense by users of computer networks
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2017-07-11
2020-05-31
BITBARRIER Bitvoyant
2016-01-08
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for packet modification, defense protection or intelligence gathering of data in motion for users of computer networks, for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for packet modification, defense protection or intelligence gathering of data in motion for users of computer networks, for use in the field of cyber defense by users of computer networks
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-09-19
2020-05-31
TRANSACTOR Bitvoyant
2016-01-08
5319979
2017-10-31
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online for use in the field of cyber defense and business intelligence by users of computer networks
700
REGISTERED
2017-10-31
2020-05-31
PERCEPTOR BitVoyant
2016-01-08
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for network deception and threat misdirection as a security measure, tactic, technique or procedure for users of computer network for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for network deception and threat misdirection as a security measure, tactic, technique or procedure for users of computer network for use in the field of cyber defense by users of computer networks
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-09-19
2020-05-31
natural systems performance management solutions health care sports network compliance services life manager customer business technologies center orthopedic therapy prevention
2016-01-11
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for intrusion detection of networks, behavioral based network analytics, custom network policy development, network alerts to potential security threats and blocks potential threats, and for packet modification, for use in the field of cyber defense and business intelligence by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for intrusion detection of networks, behavioral based network analytics, custom network policy development, network alerts to potential security threats and blocks potential threats, and for packet modification, for use in the field of cyber defense and business intelligence by users of computer networks
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2017-07-11
2020-05-31
INTROSPECTOR Bitvoyant
2015-06-19
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for computer network security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; design and development of electronic data security systems; platform as a service (paas) featuring computer software platforms for computer network security
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-08-18
2020-05-31
solutions health network security center systems services group business training school education technology team management care sports compliance life manager
2015-07-15
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for use in the field of computer network security that assist in the tracking of data exfiltration and network intelligence
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; design and development of electronic data security systems; platform as a service (paas) featuring computer software platforms for use in the field of computer network security that assist in the tracking of data exfiltration and network intellegence
603
ABANDONED - AFTER EX PARTE APPEAL
2017-05-25
2020-05-31
HONEYFILE Bitvoyant
2015-08-28
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for cyber defense for users computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for computer network security
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-04-25
2020-05-31
fugit antica spirits fabbrica torino 1786 formula giuseppe decade digital expresso breve itc lisa mcguigan micro aviation sbe entertainment expeditions
2015-08-28
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a continuous targeted threat intelligence product and service delivered on a recurring basis; provides notices and alerts, for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a continuous targeted threat intelligence product and service delivered on a recurring basis; provides notices and alerts, for use in the field of computer network security
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-10-06
2020-05-31
good feel life time live body never price fresh ahead fit international business beauty circle spectrum flavor throttle house moon
2015-08-28
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a continuous targeted threat intelligence product and service delivered on a recurring basis; provides notices and alerts, for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a continuous targeted threat intelligence product and service delivered on a recurring basis; provides notices and alerts, for use in the field of computer network security
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-10-06
2020-05-31
blue see beauty clean life well green think star international sea skin dish water roots down south pizza river ocean
2015-08-28
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a point-in-time targeted threat intelligence product and service delivered on a one-time basis; provides notices and alerts, for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a point-in-time targeted threat intelligence product and service delivered on a one-time basis; provides notices and alerts, for use in the field of computer network security
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-10-06
2020-05-31
good feel book see best listen live inside love life closer learn never smart natural well beautiful before right youll
2015-08-28
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for monitoring the internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a point-in-time targeted threat intelligence product and service delivered on a one-time basis; provides notices and alerts, for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; consulting services in the field of software as a service (saas); design and development of electronic data security systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; platform as a service (paas) featuring computer software platforms for computer network security
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-10-06
2020-05-31
account strategic market memory financial cantor report estate dx mack sales site video ticker sports does become 401k bases bny
2015-06-11
US
Trademark Image
The mark consists of a stylized letter "B" forming the face of a man. To the right of the face are stylized squares tracing upward from the eye of the face. The word "BITVOYANT" is written to the right of the face in bold letters, and is underlined by the words "PROACTIVE CYBER DEFENSE" in smaller letters.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software platforms for cyber intelligence collection and proactive cyber services and solutions, for use in the field of cyber defense by users of computer networks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; design and development of electronic data security systems
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2016-09-28
2020-05-31
solutions health network security center systems services group business training school education technology team management care sports compliance life manager
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.