Computer software and firmware for authenticating user identification; computer software and firmware for analyzing computer user behavior; downloadable software for controlling access privileges of users of computer systems; downloadable computer software in the field of identity intelligence and user behavior analytics; downloadable middleware for identifying and authenticating users and establishing and managing user identity credentials; computer software and firmware for operating system programs; computer software for managing user identity credentials; computer software for analysis of user behavior for security and access purposes
Electrical and Scientific ApparatusSoftware as a service (SAAS) featuring software in the field of identity intelligence and user behavior analytics; software as a service (SAAS) featuring software in the field of identity access management and digital security; software as a service (SAAS), namely, software for identity and access management for use in controlling access privileges of users of computer systems; software as a service (SAAS), namely, software for identity and access management software; software as a service (SAAS) featuring algorithms software for identity and access management; software as a service (SAAS) featuring algorithms software for monitoring, measuring and analyzing security management; providing temporary use of non-downloadable, cloud-based software in the field of identity and access management; providing temporary use of non-downloadable, cloud-based software, namely, identity and access management for use in controlling access privileges of users of computer systems; providing temporary use of non-downloadable, cloud-based software, namely, identity and access management software; providing temporary use of non-downloadable, cloud-based software featuring algorithms for identity and access management; providing temporary use of non-downloadable, cloud-based software featuring algorithms for monitoring, measuring and analyzing security management; computer services, namely, providing identity and access management integration across existing infrastructure and applications; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; IT consulting services; identity and access management consulting services; computer consultation services relating to identity and access management; research in the field of intelligence and security technology; computer software installation and maintenance; computer software development in the field of identity intelligence and user behavior analytics
Computer and Scientific