98871520
Nov 25, 2024
providing temporary use of non-downloadable software featuring a suite of cybersecurity software and tools for scanning and monitoring of computer network systems to identify cyber security vulnerabilities, attacks, unauthorized access or data breach, viruses, worms, spyware, adware, and malware; providing temporary use of non-downloadable software for scanning computer network environments to identify assets in the environment and define an attack surface across the network, perimeter, host, and accounts; providing temporary use of non-downloadable software for providing training to assist in prevention of cybersecurity incidents; providing temporary use of non-downloadable software for assessing and testing user training necessities and progress in the field of cybersecurity; providing temporary use of non-downloadable software for comparing a company's current security posture with industry accepted cyber security frameworks and recommendations; cybersecurity services, namely, cybersecurity operations services, namely, containment of cyber attacks and breaches after the breaches have already occurred; cybersecurity services, namely, cybersecurity operations services, namely, recovering data and restoring systems after a cyber attack to return computer networks to a pre-incident state; computer security threat analysis for protecting data; analysis and evaluation of the security policies, protocols, and network technology of others to gauge compliance with industry standards in the field of cybersecurity; providing customized data feeds featuring user-defined information in the field of cybersecurity threats to provide indicators of compromise on computer network systems and to help determine the potential objectives of computer network attacks
Computer and Scientific