KEYW
Mark Identification

KEYW

Serial Number

87732565

Filing Date

Dec 22, 2017

Registration Date

Jan 29, 2019

Trademark by

JACOBS TECHNOLOGY INC.

Active Trademark

Classification Information

computer software and computer hardware for testing and evaluating computers, computer networks and information technology systems for security vulnerability and risk relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for cyber-security, cyber-defense, information security and assurance, data security, computer security, network security and prevention of hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for monitoring, detecting, inspecting, processing, analyzing, mitigating and remediating computers, computer networks and information technology systems for hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for risk mitigation and remediation, integrity and threat analysis, cyber event data analysis, digital data intelligence gathering and analysis and dispatch of security countermeasures relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for data warehousing, data analysis, threat detection, measurement and evaluation of security process effectiveness and security management controls relating to computer security, network security and information technology systems security; computer software for security information and event management and defense against hacking, cyber-attacks, computer crimes and computer viruses, namely, monitoring computer, network and information technology system activity and identifying, investigating and responding to information security threats; computer programs for collecting, storing and managing network/enterprise log records and call detail record retention and retrieval relating to computer and network security; computer network security products, namely, computer and network hardware and software for use in computer network security, monitoring, analysis, assessment and intrusion detection; computer software and hardware for cyber attack prevention, network security threat management, intrusion detection and prevention; computer and network software and hardware for monitoring of network infrastructure and network activity, detecting, analyzing and providing assessment and countermeasures against computer viruses, cyber attacks, hacking, computer crimes and invasion of intruders into computer networks; computer programs for network management and security, network packet capture, network monitoring, network traffic characterization and network intrusion detection and tracing the origin of network traffic geolocation information, and using single or multiple processors; computer software and hardware for network management and security, network packet capture, network monitoring, network traffic characterization and network intrusion detection and tracing the origin of network traffic geolocation information, and using single or multiple processors; computer software for administration of computer networks; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; telecommunications and data networking hardware, namely, devices for transporting and aggregating voice, data, and video communications across multiple network infrastructures and communications protocols; computer software for network monitoring and forensics analysis, data replication for multiple applications to simultaneously analyze a data stream, time stamping, and for acquiring, recording, analyzing, filtering, modifying, sending and storing data while sending real-time statistics to monitoring applications; software and hardware for use in improving operational system management by identifying cyber assets and configurations, and in monitoring, viewing and identifying cyber security events and system vulnerabilities, and in streamlining compliance data collection and analysis for report generation and system wide change management, and in creating custom dashboards of compliance related activities for system wide visibility, and in compliance document management; electrical and scientific apparatus, namely, high resolution electro-optical airborne digital cameras; airborne platforms, namely, mounting devices adapted for mounting cameras on aircraft and unmanned aerial vehicles; airborne platforms, namely, mounting devices adapted for mounting sensor systems comprised of electro-optic, laser, radar, radiometric, acoustic, thermal, multi-spectral and hyper-spectral sensors on aircraft and unmanned aerial vehicles; airborne sensor systems comprised primarily of electro-optic, laser, radar, radiometric, acoustic, thermal, multi-spectral and hyper-spectral sensors; and high-resolution aerial imaging systems comprised primarily of high resolution electro-optical cameras, synthetic aperture radar systems, laser radar, lidar, bolometric and thermal imaging systems, spectral imagers, geoprocessors and geoprocessing software; radar systems consisting of radar apparatus and computer hardware and software for the control and operation of radar systems and the processing of radar data; sensor systems consisting of sensors and computer hardware and software for the control and operation of sensor systems and the processing of sensor data; geographic imagery downloadable over a global computer network; signal processing systems and electro-optical, lidar, radio frequency, radar, sensor and other devices, apparatus and technologies for gathering intelligence and geospatial intelligence data and information; portable, automated electronic surveillance system comprised of hardware and software applications to extract, process, assess and analyze data, content and information from digital devices and media for evidence and intelligence purposes; hardware and software systems for tracking and communications; computer software for data and metadata management and risk management; software to collect, filter, organize and securely store data from a wide variety of sources, including internal networks, external networks and open-source data from the Internet, to provide a user with readily available data that is relevant to a particular topic, area of interest or project; computer software for big data analysis and management; computer software for use in data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, data analytics and iterative development; computer software for cloud access, cloud storage and cloud computing; computer software development tools; computer software for computer system and application development, deployment and management; computer software that allows an operator, mission manager, or analysts to drive offensive or defensive cyber operations; end-to-end cyber mission platform comprised of hardware and software designed to deploy offensive and defensive cyberspace capabilities as a unified platform, including an immersive frontend for total cyberspace situational awareness for the operator, analyst and mission commander that unifies disparate cyberspace capabilities and provides a common interface to cyberspace data for analytics and data processing; software solution for local and distance learning environments on desktops, tablets and other mobile devices for training and education in the fields of information technology security, cyber-security, computer security, network security and data security; software and hardware solutions for collecting, processing, analyzing, filtering, indexing, searching, managing, storing, disseminating and providing reports on data and information from cyberspace and geospace for military, government and commercial purposes

Electrical and Scientific Apparatus

business consulting in the fields of data, big data, data analytics, search and search technologies; data processing services in the field of geographic information systems, remote sensing systems, global positioning systems and aerial photography, and consulting services in connection therewith; Interpretation of digital aerial and satellite images of the earth for others for business and commercial purposes; business management consulting services provided in the fields of government management, national security and defense, intelligence, cybersecurity, data analysis and business operations and management; business risk assessment services; business risk management consultation; business management consulting and advisory services relating to information management, metadata management, workflow automation, data mining, data visualization and database management; business management services, business management consulting services and business consulting services in the field of enterprise information management strategy, database development, enterprise analytics, data governance, data management, data solutions, data warehousing, data quality, data integration, data architecture, predictive analytics, optimization analytics, iterative development, and business intelligence; business management services, business management consulting services and business consulting services in the field of managed cloud solutions; business management services, business management consulting services and business consulting services in the field of customized computer system and software application development, deployment and management; business management services, business management consulting services and business consulting services in the field of business process re-engineering; business management services, business management consulting services, and business consulting services in the field of program and project management and performance management; business management services, business management consulting services and business consulting services in the field of administrative and operational support

Advertising and Business

Research and development services in the field of telecommunications and consultation services related thereto

Telecommunications

training and educational services, namely, conducting courses and certification programs in the field of cyber security, cyber-defense, information security and assurance, data security, computer security, network security, network exploitation, tactical forensics, offensive methodology and analysis, programming access tools and prevention, detection, mitigation and remediation of hacking, cyber-attacks, computer crimes and computer viruses; aerial photography services for monitoring purposes for intelligence, surveillance and reconnaissance activities, scientific and research purposes, and for disaster management, construction site management, oil and gas exploration, port security, general area of interest mapping, geographic analysis, wildlife management, hydrocarbon and geophysical exploration, agriculture management, forest management and other government and commercial uses; provision of remote imaging services, namely, aerial photography; aerial digital photographic image capture; Digital imaging services; Aerial imagery services in the nature of photography; arranging and conducting cyber-security educational training exercises; providing an on-line portal featuring an interactive learning management system for designing, developing, implementing and administering courses and training in the fields of cyber-security, computer security, network security and data security, including monitoring student progress, assessing student learning and performance, evaluating assignments, assessments, tests and exercises, providing student feedback and support, and generating reports

Education and Entertainment

computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; updating and maintaining computer software relating to computer security, network security, information technology security and data security, and prevention of computer risks, including hacking, cyber-attacks, computer crimes and computer viruses; consultation in the field of cybersecurity, computer security, network security, information technology security and data security; and providing information in the field of computer security, network security, information technology security and data security; scientific and technological services, namely, mapping and processing services, namely, performing high resolution digital mapping that includes both computer-based and paper-based graphical representations of elevation changes within the terrain, and the identification and graphical representation of the differences or changes between the imagery of a given location collected at different times and compared to the baseline imagery of the given location collected at an initial time, to aid in the evaluation of the significance of those changes by users attempting to answer geographical-based questions relating to their field of interest; image processing services in the nature of digital image correction of imagery data collected by airborne sensor systems, all for the correction of distortions introduced by effects of the collecting sensor so that it accurately reflects the true physical and geographical state of a given location, namely, compensation for lens distortion, radiometric effects and exposure time, color balancing, orthographic-projection, ortho-mosaicking, image tiling, and image compression, to produce a final mosaic output; and indexing, storage, cataloging and dissemination of georeferenced imagery and associated geospatial metadata, namely, providing online mapping services via a secure web-based service featuring the use of georeferenced imagery and imagery data for creating maps for use in disaster management, construction site management, oil and gas environmental baselining, port security, general area of interest mapping, geographic analysis, wildlife management, hydrocarbon and geophysical exploration, agriculture management, forest management, intelligence, surveillance and reconnaissance activities and other military, commercial and government uses; engineering services; software development, software systems engineering and systems analysis for military, government and commercial customers; aerial surveying services for monitoring purposes for intelligence, surveillance and reconnaissance activities, scientific and research purposes, and for disaster management, construction site management, oil and gas exploration, port security, general area of interest mapping, geographic analysis, wildlife management, hydrocarbon and geophysical exploration, agriculture management, forest management and other government and commercial uses; remote sensing services, namely, aerial surveying through the use of lidar, radar and other sensor systems; interpretation of digital aerial and satellite images of the earth for others for scientific and research purposes; photogrammetry services; cartography services, namely, making maps and scale drawings from aerial and satellite photographs; providing scientific and technological information in the fields of location intelligence and geospatial intelligence; research and development and consultation related thereto in the fields of geospatial information and data, geo-coding information, geographic information systems, location intelligence, location-specific information, and location monitoring; scientific research and consulting services in the fields of geographic information systems, and the environment; cartography and mapping; marine, aerial and land surveying; photogrammetry; geospatial services, namely, scientific analyses and interpretation of aerial imagery and data collected over land and ocean, and fusion with non-image data; geospatial services, namely, providing geographic information, surveys, global position systems and photogrammetry services for scientific and research purposes; Providing computer modeling services in the field of geo-referenced imaging, namely, computer representations of geographic locations created from aerial imagery; Image interpretation analysis services, namely, scientific analyses and interpretation of aerial imagery and data collected over land and ocean, and fusion with non-image data; systems engineering and system integration services, namely, integration of computer systems and networks; systems design, development and integration for others in the fields of computer hardware, computer networks, software, electronics, digital electronics, microelectronics and mechanical hardware; systems engineering services for military, government and commercial customers in the fields of computer hardware, computer networks, software, electronics, digital electronics, microelectronics and mechanical hardware; systems engineering, namely, analytic model design and customization in the fields of computer hardware, computer networks, software, electronics, digital electronics, microelectronics and mechanical hardware; computer software, hardware, and network design and development services, and design and consulting services related thereto; design and development of telecommunications apparatus and equipment; database design and development; computer network security services, namely, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management; software development services; data analysis of visual, textual, audio, video and geospatial data, namely, providing data mining and predictive analysis; modeling, simulation and analysis services, namely, modeling and simulating the performance of computer-based systems, computer networks and data collection systems in response to conditions or effects that affect system or network performance; providing consulting, analysis, and technical support services in the field of telecommunications, namely, analyzing telecommunications computer network performance and providing network architecture design, implementation and management of wireless computer networks for others; providing network monitoring and security services in the field of telecommunications, namely, providing network vulnerability testing and risk assessment services, and network penetration testing and network penetration mitigation services; software development; computer software consulting; consulting in the field of information technology; consulting in the field of cloud computing; computer and network configuration; installation of computer software and maintenance of computer software and networks; systems engineering in the fields of computer hardware, computer networks, software, electronics, digital electronics, microelectronics and mechanical hardware; systems architecture design in the fields of computer hardware, computer networks, software, electronics, digital electronics, microelectronics and mechanical hardware; systems integration in the fields of computer hardware, computer networks, software, electronics, digital electronics, microelectronics and mechanical hardware; hardware engineering; program management for government programs and contracts, namely technical assistance in the nature of formulating performance metrics and plans, monitoring, evaluating and managing performance against contract requirements and performance metrics, and making recommendations for performance improvements; project engineering, namely, advising and consulting in connection with engineering projects; project engineering, namely providing technical engineering services; computer services, namely, consulting on computer systems design and implementation, customization of computer software, computer hardware and software design and development, deployment and installation of computer software, management of the information technology and cloud computer systems of others; engineering services, namely, design, development and deployment of systems, apparatus, equipment, software and hardware to collect, process, analyze, monitor and disseminate intelligence and geospatial intelligence data and information; product research and development; engineering services, namely, requirements analysis, design, development, integration, production and application of radar and sensor systems, signal processing systems, apparatus, hardware and software to collect, process, analyze, monitor and disseminate intelligence and geospatial intelligence data and information; engineering services, namely, requirements analysis, development, integration, production and application of hyperspectral, multispectral and high-resolution digital imaging systems and tracking and communications systems; consulting and engineering services in the nature of risk analysis and risk management for computer security purposes; consulting and engineering services in the field of computerized workflow capture and business process automation; consulting services in the fields of metadata management and analytics for computer security intelligence purposes; computer consulting services; custom computer programming for others; computer software design for others; technical support services, namely, monitoring of computer network systems and troubleshooting of computer hardware and software problems; consulting services in the field of cloud computing; cloud computing featuring software for use in database management; design and development of computer software for database management and cloud storage of data; computer services, namely, server hosting and providing virtual computer systems and virtual computing environments through cloud computing; providing cloud computing services, namely, software as a service, infrastructure as a service and platform as a service to enable the access to a shared pool of virtualized and fully configured server, storage and networking resources hosted in a global network of data centers; computer services, namely, integration, setup and management of private, public and hybrid cloud computing environments; computer services, namely, deployment, monitoring, management and administration of cloud computing systems and software through remote access; information technology consulting services in the fields of datacenter architecture, private and public cloud computing solutions, and evaluation and implementation of internet technologies and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of private and public cloud computing, information technology and application systems; computer rental services, namely, rental of physical and virtualized computer servers, storage and networking equipment; information technology systems software development, programming, implementation, installation, configuration, upgrade and maintenance services; computer security services, namely, enforcing, restricting and controlling privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; cloud computing featuring software for use in automating business processes in conjunction with client technology infrastructure; consulting services in the field of software as a service (SAAS); data mining; data warehousing; database design and development; database development services; design and development of computer software for automating business processes, data warehouse creation, and analyzing business intelligence; providing software for automating business processes, data warehouse creation, and automating business intelligence; information technology consulting services in the field of enterprise information management strategy, database development, enterprise analytics, data governance, data management, data solutions, data warehousing, data quality, data integration, data architecture, predictive analytics, optimization analytics, iterative development and business intelligence; managed cloud solutions in the nature of computer services, namely, cloud hosting provider services, hosting and maintenance of information technology systems, software collaboration systems, servers, peripheral devices and software applications of others; information technology consulting services in the field of customized computer system and software application development, deployment and management; software as a service (SAAS) services featuring software for management of security breach incidents and responses, for use in the fields of cyber security, computer and network security; software as a service (SAAS) services featuring software for the protection of computers, computer networks and information technology systems from cyber attacks, computer hacking, computer viruses, malware, and computer crimes; software as a service (SAAS) services, namely, hosting software for use by others for use for management of security breach incidents and responses, for use in the fields of cyber security, computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for use for the protection of computers, computer networks and information technology systems from cyber attacks, computer hacking, computer viruses, malware, and computer crimes; platform as a service (PAAS) featuring computer software platforms for management of security breach incidents and responses, for use in the fields of cyber security, computer and network security; platform as a service (PAAS) featuring computer software platforms for the protection of computers, computer networks and information technology systems from cyber attacks, computer hacking, computer viruses, malware, and computer crimes; platform as a service (PAAS) featuring computer software platforms for educational management, namely, learning management system, content management system, instructional management system, student information system for education and training in the fields of cyber-security, computer security, network security, data security and information security and assurance; providing a website featuring non-downloadable software for educational management, namely, learning management system, content management system, instructional management system, student information system for education and training in the fields of cyber-security, computer security, network security, data security and information security and assurance; software as a service (SAAS) services featuring software for educational management, namely, learning management system, content management system, instructional management system, student information system for education and training in the fields of cyber-security, computer security, network security, data security and information security and assurance; online, interactive learning management system consisting of online non-downloadable software for designing, developing, implementing and administering courses and training the fields of cyber security, computer security, network security, data security and information security and assurance; providing computer facilities and data centers for training and conducting exercises in the field of cyber security, cyber-defense, information security and assurance, data security, computer security, network security and information technology security

Computer and Scientific

Interpretation of digital aerial and satellite images of the earth for others for surveillance purposes for military, government, business and commercial entities; security threat analysis services for others for protecting persons and property and for situational awareness, intelligence, surveillance and reconnaissance purposes, namely, analysis and integration of information and data in the fields of geospatial information, human terrain information, socio-cultural information, behavioral information, and human factors information and consultation related thereto; consulting services in the fields of metadata management and analytics for physical security intelligence, surveillance and reconnaissance purposes

Personal