THE MITRE CORPORATION

 THE MITRE CORPORATION contact information is shown below
Owner:THE MITRE CORPORATION
Owner Address:7515 Colshire Drive McLean VA 221027508
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byTHE MITRE CORPORATION

Brand:

A NATIONAL TECHNOLOGY RESOURCE

Description:

TECHNICAL AND SCIENTIFIC RESEARCH AND CONSULTING SERVICES IN THE FIELDS OF AIR AND SPACE TRAFFIC CONTROL SYSTEMS, SURVEILLANCE SYSTEMS, COMMUNICATION SYSTEMS DATA PROCESSING SYSTEMS, COMMAND AND CONTROL SYSTEMS AND DISPLAY SYSTEMS;

Category: TECHNICAL SCIENTIFIC RESEARCH
Brand:

ATT&CK

Description:

ATTACK; ATT AND CK;Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation;

Category: ATTACK
Brand:

CIMPL

Description:

Computer programs featuring domain-specific programming languages for information interoperability in the healthcare domain that allow a user to specify a clinical or health information model, publish that model in one or more standard forms, and store, search, and maintain revisions of the model within a model repository;Design, development, and implementation of computer programming languages and computer programs for information interoperability in healthcare particularly in the context of electronic databases storing clinical and health data and other electronic storage and communication systems for clinical data and health data; design and development of clinical and health data models for information interoperability in healthcare particularly in the context of electronic databases storing clinical and health data and other electronic storage and communication systems for clinical data and health data; consulting services in the design, development, implementation, and maintenance of computer programming languages for information interoperability in healthcare particularly in the context of databases storing clinical and health data and other electronic storage and communication systems for clinical data and health data; consulting services in the design and development of clinical data models for information interoperability in healthcare particularly in the context of databases storing clinical and health data and other electronic storage and communication systems for clinical data and health data; providing online, non-downloadable computer programs featuring domain-specific programming languages for information interoperability in the healthcare domain that allow a user to specify a clinical or health information model, publish that model in one or more standard forms, and store, search, and maintain revisions of the model within a model repository;

Category: COMPUTER PROGRAMS FEATURING DOMAIN SPECIFIC PROGRAMMING
Brand:

CREATE. DISCOVER. LEAD.

Description:

Technological and scientific research in the fields of traffic control systems, ground, air, and space traffic control systems, cybersecurity systems, health and healthcare systems, electronic health records, surveillance systems, communication systems, data processing systems, command and control systems, display systems, transportation, systems engineering systems, internet of things (IOT), quantum computing, cryptography, communications, secure networking, and veteran's health and affairs; technological and scientific research services for the defense and intelligence, aviation, homeland security, judiciary, health and healthcare, electronic health records, civil engineering, surveillance, transportation, cybersecurity, internet of things (IOT), quantum computing, cryptography, communications, secure networking, and veteran's health and affairs industries; technology consultation and research in the fields of traffic control systems, ground, air, and space traffic control systems, cybersecurity systems, health and healthcare systems, electronic health records, surveillance systems, communication systems, data processing systems, command and control systems, display systems, transportation, systems engineering systems, internet of things (IOT), quantum computing, cryptography, communications, secure networking, and veteran's health and affairs; technology consultation and research for the defense and intelligence, aviation, homeland security, judiciary, health and healthcare, electronic health records, civil engineering, surveillance, transportation, cybersecurity, internet of things (IOT), quantum computing, cryptography, communications, secure networking, and veteran's health and affairs industries;

Category: TECHNOLOGICAL SCIENTIFIC RESEARCH
Brand:

CURSOR ON TARGET

Description:

Computer software design for military users;

Category: COMPUTER SOFTWARE DESIGN MILITARY
Brand:

CVE

Description:

The mark consists of the letters C, V, and E. Several alternating squares are shown where the top, free end of the letter C meets the left leg of the letter V, and the top of the right leg of the letter V extends to form the top of the letter E.;Color is not claimed as a feature of the mark.;Providing information in the field of computer security via global computer network;

Category: