downloadable software for threat detection, breach response, threat containment to implement zero trust prevention and monitoring of cloud and network security breaches; downloadable software for monitoring internet access, providing private application access, providing business to business application access, providing cloud protection, providing digital experience monitoring, providing deception technology, and providing zero trust; downloadable software for automating the secure, verifiable, granular, and real-time exchange of data and for the controlled sharing of encrypted or non-encrypted, and optionally transformed, anonymized, sanitized, filtered and tokenized data in a zero trust environment; downloadable software and applications for developing other software; downloadable software for testing computer programs in a sandbox environment; downloadable software in the nature of sandbox environments for the purposes of development, awareness, and training related to data security, cybersecurity, information technology governance and management, and data security risk management
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for threat detection, breach response, threat containment to implement zero trust prevention and monitoring of cloud and network security breaches; software as a service (SaaS) services featuring software for use in monitoring internet access, providing private application access, providing business to business application access, providing cloud protection, providing digital experience monitoring, providing deception technology, and providing zero trust; software as a service (saas) services featuring software for automating the secure, verifiable, granular and real-time exchange of data and for the controlled sharing of encrypted or non-encrypted, and optionally transformed, anonymized, sanitized, filtered and tokenized data in a zero trust environment; software as a service (SaaS) services featuring software and applications for developing other software; providing temporary use of non-downloadable cloud-based software for testing computer programs in a sandbox environment; software as a services (SaaS) services featuring software in the nature of sandbox environments for the purposes of development, awareness, and training related to data security, cybersecurity, information technology governance and management, and data security risk management
Computer and Scientific