C

Welcome to the Brand page for “C”, which is offered here for The mark consists of the letter c contained within a circle.;downloadable computer security software for endpoint detection and response and computer forensics; downloadable computer security software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; downloadable endpoint detection and response software;crypsis;expert witness services in legal matters in the field of cybersecurity, data breach and network forensics; litigation support services;cybersecurity risk management, governance, and operations consultancy services; cybersecurity risk and resilience management services; computer and computer network consulting services in the field of cybersecurity, cybersecurity assessment, penetration testing, incident response and forensics, cybersecurity policy and procedure documentation; data breach response services, threat assessment and simulation, vulnerability analysis and mitigation, and emergency response; forensic data recovery services; managed security services in the fields of computer security, internet security, data security, and cybersecurity; software as a service featuring software for endpoint detection and response and computer forensics; software as a service featuring software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; security operations center services, remote services for computer and computer network threat detection, monitoring, and response;.

Its status is currently believed to be active. Its class is unavailable. “C” is believed to be currently owned by “Crypsis Group Holdings LLC”.

Owner:
CRYPSIS GROUP HOLDINGS LLC
Owner Details
Description:
The mark consists of the letter C contained within a circle.;Downloadable computer security software for endpoint detection and response and computer forensics; Downloadable computer security software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; Downloadable endpoint detection and response software;CRYPSIS;Expert witness services in legal matters in the field of cybersecurity, data breach and network forensics; Litigation support services;Cybersecurity risk management, governance, and operations consultancy services; Cybersecurity risk and resilience management services; Computer and computer network consulting services in the field of cybersecurity, cybersecurity assessment, penetration testing, incident response and forensics, cybersecurity policy and procedure documentation; Data breach response services, threat assessment and simulation, vulnerability analysis and mitigation, and emergency response; Forensic data recovery services; Managed security services in the fields of computer security, Internet security, data security, and cybersecurity; Software as a service featuring software for endpoint detection and response and computer forensics; Software as a service featuring software for use in detecting, identifying, analyzing, and reporting on threats to, and security vulnerabilities in, computers, computer networks, and endpoints; Security operations center services, remote services for computer and computer network threat detection, monitoring, and response;
Categories: