Trademark Overview
On Wednesday, May 1, 2024, a trademark application was filed for CULMINATE with the United States Patent and Trademark Office. The USPTO has given the CULMINATE trademark a serial number of 98529082. The federal status of this trademark filing is NON-FINAL ACTION - MAILED as of Monday, November 18, 2024. This trademark is owned by Culminate, Inc. The CULMINATE trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:
DOWNLOADABLE SOFTWARE FOR USE IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATION CENTER (SOC) ANALYSIS; DOWNLOADABLE SOFTWARE FOR USE IN ADVISING ON, THE ANALYSIS OF, THE MITIGATION OF, AND ADDRESSING POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; DOWNLOADABLE SOFTWARE FOR USE IN THE IDENTIFICATION OF AND THE INVESTIGATION OF POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; DOWNLOADABLE SOFTWARE FOR USE IN CREATING AND TRACKING CASES AND TICKETS IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATIONS CENTER (SOC) ANALYSIS; DOWNLOADABLE AI (ARTIFICIAL INTELLIGENCE) SOFTWARE FOR USE IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATION CENTER (SOC) ANALYSIS
CONSULTING SERVICES IN THE FIELD OF SECURITY THREAT ASSESSMENTS; MONITORING OF COMPUTER SYSTEMS FOR SECURITY PURPOSES, NAMELY, FOR DETECTING AND PREVENTING UNAUTHORIZED ACCESS, DATA BREACHES, SECURITY VIOLATIONS, PHISHING ATTACKS, RANSOMWARE, SECURITY VULNERABILITIES, AND MALWARE
TECHNOLOGY CONSULTATION IN THE FIELD OF CYBERSECURITY. TECHNOLOGY CONSULTATION IN THE FIELD OF SOC (SECURITY OPERATIONS CENTER) ANALYSIS; TECHNICAL CONSULTING IN THE FIELD OF CYBERSECURITY RISK MANAGEMENT TRAINING; CYBERSECURITY SERVICES IN THE NATURE OF ADVISING ON IDENTIFYING, INVESTIGATING, ANALYZING, MITIGATING AND ADDRESSING POTENTIAL THREATS AND VULNERABILITIES IN ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; CYBERSECURITY SERVICES IN THE NATURE OF LOG ANALYSIS AND LOG COLLECTION FOR MONITORING AND AUDITING ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; TECHNOLOGY CONSULTATION IN THE FIELD OF SECURITY AUDITS OF ONLINE NETWORKS, COMPUTER NETWORKS, DIGITAL SYSTEMS, AND IT (INFORMATION TECHNOLOGY) INFRASTRUCTURES; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE IN THE FIELDS OF CYBERSECURITY AND SECURITY OPERATION CENTER (SOC) ANALYSIS; PROVIDING TEMPORARY USE ...