DUSKRISE, INC.

 DUSKRISE, INC. contact information is shown below
Owner:DUSKRISE, INC.
Owner Address:331 Park Avenue South, Floor 4 New York NY 10010
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byDUSKRISE, INC.

Brand:

CLUSTER25

Description:

Educational services, namely, providing on-line and live seminars featuring the results of research related to the field of cybersecurity;CLUSTER 25; CLUSTER TWENTY FIVE; CLUSTER TWO FIVE;

Category: EDUCATIONAL SERVICES
Brand:

CLUSTER25

Description:

Educational services, namely, providing on-line and live seminars featuring the results of research related to the field of cybersecurity;The mark consists of the term CLUSTER25 in stylized form and where the letter C consists of a solid circle over which are super-imposed horizontal lines. The upper, bottom, and left-side edges of the horizontal lines form the outward curve of the C while the right-side edges form the inner portion of the C. The horizonal lines grow thinner as they progress from the top to the bottom of the C.;CLUSTER 25; CLUSTER TWENTY FIVE; CLUSTER TWO FIVE;Color is not claimed as a feature of the mark.;

Category: EDUCATIONAL SERVICES
Brand:

D

Description:

The mark consists of the letter D in a stylized form, wherein the D is comprised of horizontal lines such that the left-side edges of the horizontal lines form the stem of the D while the right-side edges form the outward curve of the D. The horizontal lines grow thinner as they progress from the top to the bottom of the D.;Computer hardware with preinstalled software for the detection and assessment of cybersecurity threats; Computer hardware; Computer hardware for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach; downloadable mobile application for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach;Color is not claimed as a feature of the mark.;Technology consultation in the field of cybersecurity; Software as a Service (SAAS) services, namely, hosting software for use by others for use to facilitate cybersecurity protection, and monitoring and assessment of network threats; Computer security threat analysis for protecting data; Cybersecurity services, namely, cybersecurity threat analysis services for protecting data and information; Monitoring of computer systems for detecting unauthorized access or data breach;

Category: