KRYPTAURI
Mark Identification

KRYPTAURI

Serial Number

90834467

Filing Date

Jul 17, 2021

Registration Date

Feb 7, 2023

Trademark by

KRYPTAURI INC.

Active Trademark

Classification Information

Strategic and tactical business intelligence services, namely, providing business intelligence services in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific intelligence gathering; Business management of the collection, analysis and reporting of vital data to contribute to the advance of deployed missions throughout the world and the protection of forces on the ground with real-time, actionable intelligence

Advertising and Business

Modernization of information technology systems and networks, namely, updating of computer hardware; computer hardware installation on information technology systems and networks; Installation of computer networking hardware; Installation, maintenance and repair of Ethernet and wireless networking hardware; Installation, maintenance and repair of computers and computer network hardware; Customizing computer hardware for computer network infrastructure; Maintenance and repair of telecommunications networking hardware, apparatus, and instruments; Providing technical support, namely, technical advice concerning the installation, repair and maintenance of computers, electronic apparatus, and equipment for information systems for military operations, government agencies and commercial enterprises; Consultancy relating to the installation, maintenance and repair of computer hardware

Building Construction and Repair

Computer services, namely remote and on-site management of information technology systems and networks for others; modernization of information technology systems and networks, namely, updating of computer software; computer systems integration services, namely, hardware and software integration planning, development, and implementation, on information technology systems and networks; installation of software on information technology systems and networks; design and development of electronic data security systems, namely, developing and implementing electronic data security systems, for information technology systems and networks; Installation, maintenance and repair of computer software; Computer network configuration services; Cloud storage services for electronic data; Computer disaster recovery planning; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer technology support services, namely, help desk services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Computer network design for others; Computer and network security services, namely, restricting unauthorized access for computer networks; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Development of security systems and contingency planning for information systems; Internet security consultancy; IT consulting services; IT consulting services in the field of cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data, communications and endpoints; IT integration service; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software, namely, security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention, application security, endpoint security, and forensics and incident response; Managed firewall and SIEM solutions, namely, computer security consultancy services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Computer security consultancy, namely, security assessment services for computer networks; Computer security consultancy, namely, security risk assessment relating to computer and network systems; Computer services, namely, computer system administration for others; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Data security consultancy; Technology consultation in the field of cybersecurity; Computer security consultancy, namely, consulting in the field of signals intelligence; Technical consulting in the field of computer security in the nature of signals intelligence collection, analysis and dissemination; Computer services, namely, remote and on-site management of the information technology (IT) systems of others, namely, management of secure information technology (IT) based services for others in the nature of information technology (IT) software applications management, enterprise services management in the nature of management of software applications, information assurance management in the nature of management of restricting network, data, and information access and management of scanning and eliminating unauthorized data and programs from files and networks and cyber security management in the nature of maintenance of computer software relating to computer security and prevention of computer risks; Technical support in the field of computer network security, namely, monitoring technological functions of computer network systems for detecting unauthorized use of network data; Technical support services for computer security purposes, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer network security services, namely, scanning and penetration testing of computer networks to assess information security vulnerability; Monitoring of computer networks for security purposes, namely, restricting unauthorized access to computer networks; Computer security services, namely, protecting data and information in computer networks from unauthorized access; Computer security services in the nature of administering digital keys; Computer security services in the nature of administering digital certificates; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, restricting unauthorized access to computer networks; Security assessments and security solutions services, namely, computer security threat analysis for protecting data and computer security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others; Consulting services in the field of security intelligence, namely, computer security consultancy Consulting services in the field of national security, namely, computer security consultancy; Computer security services for protecting data and information from unauthorized access, namely, monitoring of computer systems for computer security purposes, for compliance with federal agency and federal department regulations and guidelines, and for compliance with computer security guidelines, and for security risk assessment purposes; National intelligence services, namely, cyber threat analysis being computer security threat analysis for protecting data

Computer and Scientific

Providing information in the field of the military, military tactics and strategies; Security assessments and security solutions services, namely, security threat analysis for protecting personal safety and physical security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others, facility protection, surveillance and countersurveillance, personnel employee background screening, force protection; Strategic and tactical intelligence services, namely, providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific intelligence gathering, and threat assessment and tracking; Consulting services in the field of security intelligence, namely, physical security consultancy; Consulting services in the field of national security, namely, physical security consultancy; Providing reconnaissance and surveillance services; Providing strategic and tactical intelligence gathering and analysis for military, law enforcement, and the government, namely, providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines; Providing reconnaissance and surveillance services, namely, providing unmanned airborne Intelligence, Surveillance and Reconnaissance (ISR) services to the national Intelligence Community and the military; Providing reconnaissance and surveillance services, providing information in the field of the military, military tactics and strategies, and physical security consultancy, namely, management of the collection, analysis and reporting of vital data to contribute to the advance of deployed missions throughout the world and the protection of forces on the ground with real-time, actionable intelligence; Providing security surveillance of premises for businesses and governmental agencies; National intelligence services, namely, providing reconnaissance and surveillance services in the nature of counterintelligence (CI) services, signals intelligence (SIGINT) services, information collection management, cyber threat analysis being security threat analysis for public safety; Consulting in the field of signals intelligence, namely, consulting in the field of providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines; Technical consulting in the field of physical and personal security in the nature of signals intelligence collection, analysis and dissemination

Personal