B BITVOYANT PROACTIVE CYBER DEFENSE

Welcome to the Brand page for “B BITVOYANT PROACTIVE CYBER DEFENSE”, which is offered here for The mark consists of a stylized letter b forming the face of a man. to the right of the face are stylized squares tracing upward from the eye of the face. the word bitvoyant is written to the right of the face in bold letters, and is underlined by the words proactive cyber defense in smaller letters.;computer software platforms for cyber intelligence collection and proactive cyber services and solutions, for use in the field of cyber defense by users of computer networks;b bit voyant proactive cyber defense;color is not claimed as a feature of the mark.;proactive cyber defense;computer security consultancy; computer security service, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer virus protection services; design and development of electronic data security systems;.

Its status is currently believed to be active. Its class is unavailable. “B BITVOYANT PROACTIVE CYBER DEFENSE” is believed to be currently owned by “Bitvoyant”.

Owner:
BITVOYANT
Owner Details
Description:
The mark consists of a stylized letter B forming the face of a man. To the right of the face are stylized squares tracing upward from the eye of the face. The word BITVOYANT is written to the right of the face in bold letters, and is underlined by the words PROACTIVE CYBER DEFENSE in smaller letters.;Computer software platforms for cyber intelligence collection and proactive cyber services and solutions, for use in the field of cyber defense by users of computer networks;B BIT VOYANT PROACTIVE CYBER DEFENSE;Color is not claimed as a feature of the mark.;PROACTIVE CYBER DEFENSE;Computer security consultancy; Computer security service, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Design and development of electronic data security systems;
Categories: