D

Welcome to the Brand page for “D”, which is offered here for The mark consists of the letter d in a stylized form, wherein the d is comprised of horizontal lines such that the left-side edges of the horizontal lines form the stem of the d while the right-side edges form the outward curve of the d. the horizontal lines grow thinner as they progress from the top to the bottom of the d.;computer hardware with preinstalled software for the detection and assessment of cybersecurity threats; computer hardware; computer hardware for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach; downloadable mobile application for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach;color is not claimed as a feature of the mark.;technology consultation in the field of cybersecurity; software as a service (saas) services, hosting software for use by others for use to facilitate cybersecurity protection, and monitoring and assessment of network threats; computer security threat analysis for protecting data; cybersecurity services, cybersecurity threat analysis services for protecting data and information; monitoring of computer systems for detecting unauthorized access or data breach;.

Its status is currently believed to be active. Its class is unavailable. “D” is believed to be currently owned by “DUSKRISE, INC.”

Owner:
DUSKRISE, INC.
Owner Details
Description:
The mark consists of the letter D in a stylized form, wherein the D is comprised of horizontal lines such that the left-side edges of the horizontal lines form the stem of the D while the right-side edges form the outward curve of the D. The horizontal lines grow thinner as they progress from the top to the bottom of the D.;Computer hardware with preinstalled software for the detection and assessment of cybersecurity threats; Computer hardware; Computer hardware for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach; downloadable mobile application for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach;Color is not claimed as a feature of the mark.;Technology consultation in the field of cybersecurity; Software as a Service (SAAS) services, hosting software for use by others for use to facilitate cybersecurity protection, and monitoring and assessment of network threats; Computer security threat analysis for protecting data; Cybersecurity services, cybersecurity threat analysis services for protecting data and information; Monitoring of computer systems for detecting unauthorized access or data breach;
Categories: