CSRA
Mark Identification

CSRA

Serial Number

86806598

Filing Date

Nov 2, 2015

Registration Date

Mar 19, 2019

Trademark by

GENERAL DYNAMICS INFORMATION TECHNOLOGY INC.

Active Trademark

Classification Information

Computer hardware; Computer software for identification and verification of biometric data in the area of biometric security; Computer software for use in storage, management, analysis and optimization of data warehouses and very large databases; computer software for database management; computer programs used in accessing databases; Full line of computer software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; Web services software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; Application server software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; Database software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; Business intelligence software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; Internet and intranet portal software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; Data warehousing automation software; Content management software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; Online training software in the fields of cybersecurity, education, technology, legal compliance, ethics, business, background investigation, information technology skills and certification, accounting and finance, and military and defense training provided to both military personnel and civilians; Software for ensuring the security of electronic mail; Scheduling software in the fields of identifying cybersecurity incidents for threat analysis and responses, assigning personnel to address incidents, scheduling compute, network, and storage resources to developers, and scheduling software to receive, review, and process business functions across business process outsourcing engagements; Wireless communications software to manage, analyze, retrieve, monitor, maintain, report on, structure, model, forecast, present and display data and information from computer databases and the internet, and for the development, analysis, management, integration, deployment and maintenance of computer software; voice enablement software; Biometric security devices that electronically transfer sound and/or data for identification and authentication in the nature of biometric scanning from fingerprint scans, hand geometry, retinal scans, iris scans, facial recognition scans, DNA scans, voice recognition scans and any artificial personal biometric identifier as a security device; Flight simulators; Online downloadable forms for collecting visa-related information and data from visa applicants

Electrical and Scientific Apparatus

Providing training for the purpose of training government, defense and military personnel in the operation of various platforms including surface and subsurface ships and aircraft; Training of government, defense and military personnel in the operation of various platforms including surface and subsurface ships and aircraft through the use of submarine and flight simulation services; Aircraft flight training and instruction; Providing lifecycle training services and support, namely, live-fire range services worldwide for the purpose of training defense and military personnel in their operation; Computer-based and instructor led training for individuals, organizations, academic institutions, government agencies and defense and military on the subject of information security, computer network security, computer software security, cybersecurity and forensic analysis; Simulated training exercises for defense and military entities on the subject of medical training and management oversight and administration for contractor activities, and supply support for government-owned property and material for forward deployed medical units; Training services in the field of agile software development and utilizing agile methodologies for managing projects and computer project management; Training for government and business employees in the area of privacy laws and regulations; Educational services, namely, the offering of web-based training for security screeners to enhance threat detection skills through use of simulated x-ray machines; technical consulting in the field of force projection training; Consulting services for the training of utilizing agile methodologies for managing projects and computer project management

Education and Entertainment

Computer security consultancy in the nature of advanced cybersecurity services featuring the application of techniques, tools and expertise to detect and remediate advanced persistent threats and insider threats and include offensive cyber capabilities; Computer security consultancy in the fields of identity and access management software solutions, electronic signature verification services using technology to authenticate user identity solutions, multi-factor authentication, issuance and validation of digital certificates, public key infrastructure (PKI), security operating center tools, namely, security information and event management, endpoint protection, intrusion detection, compliance management, treat intelligence, incident investigation, SOC automation, enterprise mobility management, mobile device management and API gateways; Encryption, decryption and authentication of data; Computer server hosting services, namely, creating online virtual desktop environments through use of hosted computer hardware and computer software resources for secure remote encrypted access to mission applications and information; Data migration services; Installation and maintenance of computer software; Information technology consulting services; Computer network, and information technology systems security and mobile device security consultancy; Consulting services in the field of cloud computing; Computer services, namely, cloud hosting provider services; Technical support services, namely, technical consulting, remote administration and management of public, private, and hybrid cloud computing environments; Computer consultation; Computer software consulting services; Technical support services, namely, troubleshooting of computer software problems; Recovery of computer data; Data migration services; Development of computer software and hardware for biometrics; Computer systems integration and computer data analysis for biometrics; Computer software development in the field of mobile applications; Application development services, namely, application product testing and quality assurance management of computer applications and software of others; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer software hosting for others on a private server, featuring the operation of data centers for others; Computer technology support services, namely, help desk services; Platform as a service (PaaS), namely, providing online software platforms for development and provisioning of applications in the cloud; Development, maintenance and hosting of databases featuring the persistence and management of data for business, back-office and mission applications and to support reporting, business intelligence and analytic purposes; Engineering; Electronic data storage; Computer services, namely, remote management of mobile devices' software applications, access and security; Providing online, non-downloadable software for healthcare data analytics for the purpose of improving patient care and reducing healthcare costs; Platform as a service (PaaS) featuring computer software platforms for big data analytics, application development, and application deployment; Computer services, namely, designing and implementing websites featuring security and privacy requirements in information technology systems for others; Operation and management of computer network, and information technology systems security operations centers for the government; Planning, design and implementation of computer technologies and information technology systems for others; Design, development and implementation of continuous software deployment and sustainment systems; Engineering services in the field of information and technical analysis for national defense and industrial C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) programs; Computer modeling services, namely, process performance modeling; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Computer systems engineering and integration consulting services featuring analysis, simulation, and modeling of various government operations; Scientific research; Scientific research in the field of general health of humans; Providing temporary use of non- downloadable computer anti-virus software; Monitoring of computer systems to detect breakdowns and ensure proper functioning; Computer services, namely, providing online portals that enable employees of an enterprise to install and service computer software applications from such enterprise's online software application store; Computer security service, namely, remote resetting and recovery of user passwords using technology to authenticate user identity; Providing a web-based system and online portal featuring computer software for remote managing, locking, unlocking, wiping of data, and locating mobile and wireless devices; Remote computer backup and restore services; Cloud services, namely, integration of private and public cloud computing environments; Cloud services, namely, designing, developing, providing, and managing cloud computing software solutions, namely, Infrastructure as a Service (IaaS) for standardized and automated computing services offered on hosted storage, and networking capabilities offered to customers on-demand, Software as a Service (SaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS), namely, cloud-hosted e-mail services; Cloud brokerage services, namely, managing public, private, and community cloud computing systems for others; Computer software development; Providing an online portal featuring technology that allows individuals and employers to compare health insurance rates and apply for health insurance coverage; Computer simulation services for the training of government, defense and military personnel in the operation of various platforms including surface and subsurface ships and aircraft; Installation, maintenance and repair of software for computer systems and call centers

Computer and Scientific

Conducting background investigations for governments; Consular document management services, namely, legal assistance with and submission of consular documents of others that are required for compliance with laws and regulations; Consultation services concerning emergency management services, namely, review, recommendations and consulting concerning governmental emergency response policies and procedures for compliance with laws and regulations; Consulting services in the field of security intelligence; Consulting services in the field of national security; Providing reconnaissance and surveillance services; Providing strategic and tactical intelligence gathering and analysis for military, law enforcement, and the government; Computer security services in the nature of providing computer security assurance services and the administration of digital keys and digital certificates; Monitoring of computer systems for security purposes, for compliance with federal agency and federal department regulations and guidelines, and for compliance with computer security guidelines, and for security risk assessment purposes; Issuance of digital certificates; Consulting services in the fields of environmental policy and regulatory development, namely, reviewing standards and practices to assure compliance with environmental laws and regulations; Technical consulting in the fields of border and immigration security; Identity verification and security services

Personal