MANDIANT, INC.

 MANDIANT, INC. contact information is shown below
Owner:MANDIANT, INC.
Owner Address:11951 Freedom Drive, 6th Floor Reston VA 20190
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byMANDIANT, INC.

Brand:

ADAPTIVE DEFENSE

Description:

DEFENSE;Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of providing network access to cyber-threat intelligence, to cyber-attack verification, and to security analysis of network traffic, emails, files, media computer software, and mobile applications;

Category: DEFENSE
Brand:

ANSWERS, NOT ALERTS

Description:

Computer security services, namely, managed detection and response services in the nature of Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices;

Category: COMPUTER SECURITY SERVICES
Brand:

ELEVATE

Description:

association services, namely, promoting greater inclusion and empowerment of women in the information security industry;

Category: ASSOCIATION SERVICES
Brand:

INTELLIGENT RESPONSE

Description:

Computer hardware and software system for centralized identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer and computer network data, metadata, files, information and security breach incidents, for use in incident detection, security and system intrusion assessment, investigation of damage to or use of computer data and files, diagnostics, forensic data investigation, electronic evidence discovery and business loss valuation; computer hardware and software for creating searchable databases of information and data and managing storage devices in a networked environment;INTELLIGENT;

Category: COMPUTER HARDWARE SOFTWARE SYSTEM
Brand:

M

Description:

Providing continuing education courses pertaining to information, computer and internet security; providing continuing education in the field of computer forensics;The mark consists of an outline of letter M appearing in the lower right-hand portion of a square.;[ Computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security ];MANDIANT;Color is not claimed as a feature of the mark.;[ Litigation support services; counseling in the field of compliance with legal, regulatory and self-regulatory standards in the field of computer and information security; consulting services in the field of critical incident response to information, computer, and internet security breaches, namely, consultation regarding the monitoring of computer systems for security purposes, maintaining the security and integrity of databases, providing security assessments of information systems and working environments, and providing security assessments for businesses and governmental agencies ];Computer consultation in the field of computer security; research in the field of forensic intelligence and information, computer and internet security; computer software development; development of software for secure network operations; development, updating and maintenance of software and databases; technical support, namely, monitoring of network systems; design and development of networks; electronic discovery counseling; computer services, namely, providing forensic services to recover lost and deleted data; consulting services in the field of planning for critical incident response to information, computer and internet security breaches;

Category: PROVIDING CONTINUING EDUCATION COURSES PERTAINING
Brand:

M

Description:

Providing continuing professional education courses in the field of information, computer and internet security; providing continuing professional education courses in the field of computer forensics;The mark consists of a stylized letter M where there is a break in the right side leg at the top.;Computer software, namely, downloadable software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security;MCCARTHY; MISEMER;Color is not claimed as a feature of the mark.;compiling crime occurrence data; litigation support services; compliance counseling with legal, regulatory, and self-regulatory standards in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security;Computer consultation in the field of computer security; scientific research in the field of forensic intelligence and information, computer and internet security; computer software development; development of software for secure network operations; development, updating and maintenance of software and databases; technical support, namely, monitoring technological functions of network systems; design and development of computer networks; computer services, namely, providing computer forensic services to recover lost and deleted data; data security consulting services in the field of critical incident response to information, computer and internet security breaches;

Category: PROVIDING CONTINUING PROFESSIONAL EDUCATION COURSES
Brand:

MANDIANT

Description:

Providing continuing education courses pertaining to information, computer and internet security; providing continuing education in the field of computer forensics.;Computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security.;Consulting services in the field of maintaining the security and integrity of databases; monitoring of computer systems for security purposes; compiling crime occurrence data.;Computer consultation in the field of computer security; research in the field of forensic intelligence and information, computer and internet security; computer software development; development of software for secure network operations; development, updating and maintenance of software and databases; litigation support services; technical support, namely, monitoring of network systems; design and development of networks; counseling in the field of compliance with legal, regulatory and self-regulatory standards; electronic discovery counseling; computer services, namely, providing forensic services to recover lost and deleted data; consulting services in the field of critical incident response to information, computer and internet security breaches.;

Category: PROVIDING CONTINUING EDUCATION COURSES PERTAINING
Brand:

MANDIANT ACADEMY

Description:

Providing continuing professional education courses in the field of information, computer and internet security; providing continuing professional education courses in the field of computer forensics; Educational services, namely, offering web-based and in-person classes in the fields of computer and internet security and computer forensics;ACADEMY;Testing, analysis, and evaluation of the knowledge, skills, and abilities of others in the fields of computer and internet security and computer forensics to determine confirmity with certification standards of proficiency of professional skills;

Category: PROVIDING CONTINUING PROFESSIONAL EDUCATION COURSES
Brand:

MIR

Description:

Computer hardware and software system for centralized identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer and computer network data, metadata, files, information and security breach incidents, for use in incident detection, security and system intrusion assessment, investigation of damage to or use of computer data and files, diagnostics, forensic data investigation, electronic evidence discovery and business loss valuation; computer hardware and software for creating searchable databases of information and data and managing storage devices in a networked environment;The wording MIR has no meaning in a foreign language.;

Category: COMPUTER HARDWARE SOFTWARE SYSTEM
Brand:

MTRENDS

Description:

Downloadable reports in the field of information security and threat response;printed publications, namely, periodic reports in the field of information security and threat response;MANDIANT TRENDS;

Category: DOWNLOADABLE REPORTS FIELD
Brand:

MWISE

Description:

Conducting of conferences in the field of cyber security;MANDIANT WISE;

Category: CONDUCTING CONFERENCES
Brand:

PGO

Description:

Downloadable computer software, namely, artificial intelligence (AI) decision analysis software for management of security breach incidents and security operations center (SOC) remediation services, for use in the fields of computer and computer network security, forensic, diagnostic, business economic impact, and education pertaining to information, computer and incident security; computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, malware infection, and computer viruses;

Category: DOWNLOADABLE COMPUTER SOFTWARE
Brand:

PGO

Description:

Cloud-based computing services featuring software for management of security breach incidents and security operations center (SOC) remediation services, for use in the fields of computer and computer network security, forensic, diagnostic, business economic impact, and education pertaining to information, computer and incident security; Platform as a Service (PAAS) services in the nature of providing an automated decision analysis expert system for the protection of digital assets from cyber warfare, computer hacking, malware infection, and computer viruses;

Category: CLOUD BASED COMPUTING SERVICES FEATURING SOFTWARE
Brand:

R

Description:

The mark consists of The mark consists of a square with the letter R positioned to the bottom left field of the square, with horizontal lines across the square.;Computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response;Color is not claimed as a feature of the mark.;

Category: