Description of Mark | The mark consists of a circular diagram titled "Tesseract," divided into six color-coded segments, each representing different stages of a continuous maturity platform. At the center of the circle is a stylized logo consisting of interlocking shapes that form a 3D cube-like structure, incorporating the colors orange, blue, gray, and purple. Below the logo, the word "TESSERACT" is written in uppercase letters in black. The diagram is segmented into six parts: "Identify," "Protect," "Detect," "Respond," "Recover," and "Evolve." The "Identify" segment at the top is orange with the word "IDENTIFY" in white, centrally placed, accompanied by a white magnifying glass icon above the text. This segment is topped by an arc with the word "GOVERN" in white on an orange background. Moving clockwise, the "Protect" segment is blue with "PROTECT" in white, featuring a shield icon, and is topped by a light blue arc with the word "HARDEN" in white. Next, the "Detect" segment is dark purple with "DETECT" in white, including a radar icon, and is accompanied by a light purple arc with "DEFEND" in white. The "Respond" segment is purple with "RESPOND" in white, featuring a network or node icon, and is mirrored by a light purple arc with "DEFEND" in white. The "Recover" segment is dark blue with "RECOVER" in white, displaying a wrench icon, and has a light blue arc with "HARDEN" in white. Finally, the "Evolve" segment is orange with "EVOLVE" in white, showing a lifebuoy icon, and is topped by a light orange arc with "GOVERN" in white. Additional elements include black and white arrows within each segment pointing clockwise, indicating the flow from one segment to the next. The overall design features a palette of orange, blue, light blue, dark blue, purple, dark purple, white, and black. |
Indication of Colors claimed | The color(s) orange, blue, light blue, dark blue, purple, dark purple, white, gray, and black is/are claimed as a feature of the mark. |
Goods and Services | Consulting services for others in the field of design, planning, and implementation project management of cybersecurity; Technology consultation in the field of cybersecurity; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cybersecurity |