CULMINATE
Mark Identification

CULMINATE

Serial Number

98529082

Filing Date

May 1, 2024

Trademark by

CULMINATE INC.

Classification Information

DOWNLOADABLE SOFTWARE FOR USE IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATION CENTER (SOC) ANALYSIS; DOWNLOADABLE SOFTWARE FOR USE IN ADVISING ON, THE ANALYSIS OF, THE MITIGATION OF, AND ADDRESSING POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; DOWNLOADABLE SOFTWARE FOR USE IN THE IDENTIFICATION OF AND THE INVESTIGATION OF POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; DOWNLOADABLE SOFTWARE FOR USE IN CREATING AND TRACKING CASES AND TICKETS IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATIONS CENTER (SOC) ANALYSIS; DOWNLOADABLE AI (ARTIFICIAL INTELLIGENCE) SOFTWARE FOR USE IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATION CENTER (SOC) ANALYSIS

Electrical and Scientific Apparatus

TECHNOLOGY CONSULTATION IN THE FIELD OF CYBERSECURITY. TECHNOLOGY CONSULTATION IN THE FIELD OF SOC (SECURITY OPERATIONS CENTER) ANALYSIS; TECHNICAL CONSULTING IN THE FIELD OF CYBERSECURITY RISK MANAGEMENT TRAINING; CYBERSECURITY SERVICES IN THE NATURE OF ADVISING ON IDENTIFYING, INVESTIGATING, ANALYZING, MITIGATING AND ADDRESSING POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; CYBERSECURITY SERVICES IN THE NATURE OF LOG ANALYSIS AND LOG COLLECTION FOR MONITORING AND AUDITING ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; TECHNOLOGY CONSULTATION IN THE FIELD OF SECURITY AUDITS OF ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATION CENTER (SOC) ANALYSIS; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE IN ADVISING ON, THE ANALYSIS OF, THE MITIGATION OF, AND ADDRESSING POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE IN THE IDENTIFICATION OF AND THE INVESTIGATION OF POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE IN CREATING AND TRACKING CASES AND TICKETS IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATIONS CENTER (SOC) ANALYSIS; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE AI (ARTIFICIAL INTELLIGENCE) SOFTWARE FOR USE IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATION CENTER (SOC) ANALYSIS

Computer and Scientific

CONSULTING SERVICES IN THE FIELD OF SECURITY THREAT ASSESSMENTS; MONITORING OF COMPUTER SYSTEMS FOR SECURITY PURPOSES, NAMELY, FOR DETECTING AND PREVENTING UNAUTHORIZED ACCESS, DATA BREACHES, SECURITY VIOLATIONS, PHISHING ATTACKS, RANSOMWARE, SECURITY VULNERABILITIES, AND MALWARE

Personal