"BiZone" Limited Liability Company

 "BiZone" Limited Liability Company contact information is shown below
Owner:"BIZONE" LIMITED LIABILITY COMPANY
Owner Address:Olkhovskaya Street, 4, b. 2, office 515 RU-105066 Moscow Russian Federation
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned by"BiZone" Limited Liability Company

Brand:

BI.ZONE

Description:

The mark consists of the design of a bull that represents a constellation, above the wording BI.ZONE in stylized font. The entire mark is in blue color. The white color in the space around the bull's feet represents background and/or transparent areas and is not part of the mark.;Downloadable computer software for protection, monitoring, authenticating and securing of data on computers, computer networks, endpoints and mobile devices; downloadable computer software for endpoint detection and response; downloadable computer game software; downloadable computer programs for protection, monitoring, authenticating and securing of data on computers, computer networks, endpoints and mobile devices; downloadable computer programs for endpoint detection and response; downloadable computer operating programs; downloadable computer application software for mobile phones, handheld computers, desktop computers, servers, namely, software for endpoint detection and response;Providing access to databases; computer aided transmission of messages and images; transmission of digital files;The color(s) blue is/are claimed as a feature of the mark.;Collection of information into computer databases in the field of cybersecurity; systemization of information into computer databases; computerized database management; collection of information into computer database for use as a web-based catalogue in the field of cybersecurity; providing business information via a website; business efficiency expert services; collection and systemization of information into computer databases, and compilation and analysis of business data and information stored in such computer databases; on-line data processing services;Intellectual property consultancy; inspection of factories for safety purposes; monitoring of burglar and security alarms; online tracking of stolen property; private investigation specializing in information security incidents;Data security consultancy; computer virus protection services; electronic monitoring of credit card activity to detect fraud via the internet; electronic monitoring of personal identifying information to detect information theft via the Internet; computer system analysis; recovery of computer data; installation of computer software; scientific research; technical research in the field of cybersecurity; information technology [IT] consultancy; technological consultancy in the technology field of cybersecurity; engineering; computer software consultancy; updating of computer software; monitoring of computer systems to detect breakdowns; monitoring of computer systems by remote access to ensure proper functioning; software as a service [SaaS] services featuring software for threat intelligence, fraud analysis, email security, web application security, DDoS protection, DNS security; maintenance of computer software; providing information on computer technology and programming via a website; conversion of computer programs and data, other than physical conversion; computer system design; data encryption services; development and testing of computer software; research and analysis of malicious software; computer security consultancy in the field of the occurrence of information security incidents and elimination of vulnerabilities; monitoring of computer systems for detecting unauthorized access or data breach; computer security services, namely, restricting unauthorized network access to hard drives, computer networks, and websites from malicious online resources and Internet fraud committed in order to gain access to confidential data of Internet users; maintenance of computer software relating to computer security and prevention of computer risks; website load testing services; computer and technical services, namely, computer security threat analysis for protecting data featuring threat intelligence, fraud analysis, endpoint detection and response, managed detection and response service, all to ensure the security of computer data, personal data and financial data, as well as to detect unauthorized access to data and information; testing of computer hardware, software and application software with regard to security level; rental of application software; design and development of on-line computer software systems for data input, output, processing, display and storage; computer software development in the field of cybersecurity and updating of computer software; computer programming and computer software design; technological research in the field of computer programs and software; testing of computer hardware and computer programs;

Category: