Computer hardware; Downloadable computer software for network security; Downloadable computer software using artificial intelligence for detecting, monitoring, and preventing network security risks and privacy risks
Electrical and Scientific ApparatusComputer security services, namely, restricting unauthorized network access by users without credentials; Computer security services, namely, restricting unauthorized network access by monitoring and reporting on cyber-threats for others; Design and development of electronic data security systems; Design and implementation of software and technology solutions for the purpose of product and document authentication and tracking, and brand monitoring and protection, to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents; Providing temporary use of on-line non-downloadable software for use in the detection and prevention of online fraud and for credit card fraud detection; Software as a service (SAAS) services featuring software for use by others featuring software for detecting, monitoring, and preventing network security risks and privacy risks; Software as a service (SAAS) services featuring software for use by others featuring software for protecting and securing websites; Software as a service (SAAS) services featuring software for use by others featuring software for preventing network attacks and network security breaches; Computer security threat analysis for protecting data
Computer and ScientificAnti-counterfeiting consulting in the fields of product and document authentication and tracking, and brand monitoring and protection, to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents
Personal