Software for computer network security; computer software for management of physical and virtual devices connected to a network for the detection of unauthorized access and data breaches and for authorization management; software for security and compliance automation, continuously monitoring and collecting evidence of a company's security controls, and streamlining workflows to ensure audit-readiness; computer software for computer network security and for monitoring and identifying computer network users and cloud, mobile or network applications and computer hardware and the network activities of computer users and cloud, mobile or network applications and computer hardware; downloadable and recorded computer software and computer hardware for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; downloadable computer software for providing data and information assurance and security, information security policy validation and enforcement
Electrical and Scientific ApparatusComputer network security services; services for monitoring of computer systems of network connected physical and virtual devices by remote access for the detection of unauthorized access and data breaches and for authorization management; monitoring of computer systems of network-connected physical and virtual devices for detecting unauthorized access or data breach; software as a service (SAAS) services featuring software for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; computer security support services; Software as a service services (SaaS) featuring software for monitoring, analyzing, auditing, automating, identification, discovery, centralization, unification, management, optimization, integration, and security of users, actions, data, software and files; Software as a service services (SaaS) featuring software for identifying and reporting security threats, automating remediation on breaches of security policies, enforcing security policies, eliminating security vulnerabilities, security compliance monitoring, managing access rights and providing alerts and notifications; design, development and implementation of software in the field of data and network security; design, development and implementation of software in the fields of cloud, mobile or network applications; information technology support services, namely, monitoring network systems via information technology service support centers and helpdesks
Computer and Scientific