Brands and Their Owners
Welcome to the Brand page for “ROAM”, which is offered here for The mark consists of the mark consists of the word roam with the o being in the style of the graphical symbol for standby used on equipment.;downloadable communications software for use with secure network and internet operations enabling users to review, manage, test, and analyze website cyber security reporting and logging; downloadable computer software for end-to-end encryption;software as a service (saas) services featuring software for use in database management; computer technical support services, service desk management; online non-downloadable computer security software that provides a secure web gateway between networks; online non-downloadable computer software for use in internet content filtering; online non-downloadable computer security software for use with secure network and internet operations enabling users to review, manage, test, and analyze website cyber security reporting and logging; online non-downloadable computer software for end-to-end encryption;.
Its status is currently believed to be active. Its class is unavailable. “ROAM” is believed to be currently owned by “3MD, Inc.”
Owner: |
3MD, INC.
Owner Details |
---|---|
Description: |
The mark consists of The mark consists of the word ROAM with the O being in the style of the graphical symbol for standby used on equipment.;Downloadable communications software for use with secure network and internet operations enabling users to review, manage, test, and analyze website cyber security reporting and logging; downloadable computer software for end-to-end encryption;Software as a Service (SAAS) services featuring software for use in database management; computer technical support services, service desk management; online non-downloadable computer security software that provides a secure web gateway between networks; online non-downloadable computer software for use in internet content filtering; online non-downloadable computer security software for use with secure network and internet operations enabling users to review, manage, test, and analyze website cyber security reporting and logging; online non-downloadable computer software for end-to-end encryption;
|
Categories: |