B

Welcome to the Brand page for “B”, which is offered here for Anti-malware software applications, computer software for providing network, internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, trojan horses, ad-ware, spyware, and other malware; internet security software, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software; computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files, enterprise security software; fire wall software; privacy control software; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in networking applications, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communication application, computer programs for use in the field of computer system administration, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security;the mark is represented by the letter b (in special graphics, written in a capital letter), in silver color, placed in the center of a rectangle with double margins, also in silver color; the background of the rectangle is depicted in shades of red and its surface is covered with black dots.;bitdefender;the color(s) red, silver and black is/are claimed as a feature of the mark.;.

Its status is currently believed to be active. Its class is unavailable. “B” is believed to be currently owned by “BITDEFENDER IPR MANAGEMENT LTD”.

Owner:
BITDEFENDER IPR MANAGEMENT LTD
Owner Details
Description:
Anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for providing online identity protection and parental control, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, ad-ware, spyware, and other malware; Internet security software, computer software for use in the monitoring and control of computer and online activity, fraud protection software, computer optimization software; computer software to prevent, diagnose, and repair computer problems, computer software for the back-up, storage, restoration and recovery of data, folders, and files, enterprise security software; fire wall software; privacy control software; content filtering software, computer software for the creation of virtual private network, utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks, computer software for use in updating other computer software, computer software for use in networking applications, computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer, computer software that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for data storage management in storage area networks; computer software for backing up and restoring computer data; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for generating reports from databases, computer software for scheduling automated processes; computer software for central management of computers attached to a computer network; computer software for replicating and archiving files from one data store to another; computer programs for encryption and authentication of electronic information for use in data communication application, computer programs for use in the field of computer system administration, programs for the administration and management of computer programs and electronic data about computer systems, computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; embedded software for network monitoring and security;The mark is represented by the letter B (in special graphics, written in a capital letter), in silver color, placed in the center of a rectangle with double margins, also in silver color; the background of the rectangle is depicted in shades of red and its surface is covered with black dots.;BITDEFENDER;The color(s) red, silver and black is/are claimed as a feature of the mark.;
Categories: ANTI MALWARE SOFTWARE APPLICATIONS