Brands and Their Owners
DUSKRISE, INC. contact information is shown below | |
Owner: | DUSKRISE, INC. |
---|---|
Owner Address: | 331 Park Avenue South, Floor 4 New York NY 10010 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
CLUSTER25 |
---|---|
Description: | Educational services, namely, providing on-line and live seminars featuring the results of research related to the field of cybersecurity;CLUSTER 25; CLUSTER TWENTY FIVE; CLUSTER TWO FIVE; |
Category: | EDUCATIONAL SERVICES |
Brand: |
CLUSTER25 |
---|---|
Description: | Educational services, namely, providing on-line and live seminars featuring the results of research related to the field of cybersecurity;The mark consists of the term CLUSTER25 in stylized form and where the letter C consists of a solid circle over which are super-imposed horizontal lines. The upper, bottom, and left-side edges of the horizontal lines form the outward curve of the C while the right-side edges form the inner portion of the C. The horizonal lines grow thinner as they progress from the top to the bottom of the C.;CLUSTER 25; CLUSTER TWENTY FIVE; CLUSTER TWO FIVE;Color is not claimed as a feature of the mark.; |
Category: | EDUCATIONAL SERVICES |
Brand: |
D |
---|---|
Description: | The mark consists of the letter D in a stylized form, wherein the D is comprised of horizontal lines such that the left-side edges of the horizontal lines form the stem of the D while the right-side edges form the outward curve of the D. The horizontal lines grow thinner as they progress from the top to the bottom of the D.;Computer hardware with preinstalled software for the detection and assessment of cybersecurity threats; Computer hardware; Computer hardware for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach; downloadable mobile application for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach;Color is not claimed as a feature of the mark.;Technology consultation in the field of cybersecurity; Software as a Service (SAAS) services, namely, hosting software for use by others for use to facilitate cybersecurity protection, and monitoring and assessment of network threats; Computer security threat analysis for protecting data; Cybersecurity services, namely, cybersecurity threat analysis services for protecting data and information; Monitoring of computer systems for detecting unauthorized access or data breach; |
Category: |