downloadable resources in the nature of interactive templates for use at a company by security, compliance, engineering, or technical personnel for use in continuously monitoring a company's security state and compliance with security standards; downloadable resources in the nature of interactive templates for use at a company by security, compliance, engineering, or technical personnel for use in continuously monitoring the company's security state and compliance with security standards in the fields of compliance, compliance risk management, security, computer security compliance, and compliance audits in digital and electronic format
Electrical and Scientific Apparatusproviding a website featuring resources, namely, non-downloadable publications in the nature of interactive templates for use at a company by security, compliance, engineering, or technical personnel for use in continuously monitoring the company's security state and compliance with security standards in the fields of compliance risk management, security, computer security compliance, and compliance audits
Education and Entertainmentsoftware as a service (SAAS) services featuring software for security, namely, for reading software and hardware configurations and ensuring they follow best practices, sending notifications when those configurations change, and enforcing those best practices; Software as a service (SAAS) services featuring software for standards compliance audits; Software as a service (SAAS) services featuring software for automatically auditing and securing cloud infrastructure; Software as a service (SAAS) services featuring software for internet security, namely, enforcing best security practices across all cloud infrastructure and external vendors; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data
Computer and Scientificregulatory compliance auditing; regulatory compliance consulting in the fields of compliance, compliance risk management, security, computer security compliance, and compliance audits
Personal