| Logo Mark Critical Informatics, Inc.
88618038 16 Sep 2019 | on 24 Jun 2020 | Monitoring third-party information systems, operational technology (OT... Class 045 Class 045 Personal & Legal & Social Services The mark consists of a stylized image of a kraken, a fictional sea monster resembling an octopus. The body and tentacles are depicted in thick, curving lines with rounded ends. Two eyes are depicted with thick wedges that taper upwards and outwards, creating an angry effect. | | | CRITICAL INSIGHT Critical Informatics, Inc.
88617984 16 Sep 2019 | on 24 Jun 2020 | Monitoring third-party information systems, operational technology (OT... Class 045 Class 045 Personal & Legal & Social Services Monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services | | | CI SECURITY Critical Informatics, Inc.
88618018 16 Sep 2019 | on 24 Jun 2020 | Monitoring third-party information systems, operational technology (OT... Class 045 Class 045 Personal & Legal & Social Services Monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services | |