Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, and portable electronic devices; Computer security services, namely, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; maintenance of computer software in the field of computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, and portable electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, and portable electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, and portable electronic devices, including on a real-time basis for identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis
Computer and Scientific