downloadable computer software for providing security and compliance management tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs to discover, prioritize, and process security, compliance, and policy violations in these environments; downloadable computer software for use in information technology system vulnerability and risk management for cybersecurity and cybersecurity awareness and training, identifying vulnerable IT software and components and provide insights like vulnerabilities, advisories, exploits, to help users to evaluate, prioritize, and process potential risks and findings and improve their systems; downloadable computer software for cloud security and internet security for use in cloud deployments like to help identify security risks, compliance issues, and other types of policy violations across all levels of users' cloud deployments
Electrical and Scientific Apparatusproviding temporary use of non-downloadable computer software for providing security and compliance management tools for use in servers, containers, and other IT environments, running on CLI and Graphical UIs, to discover, prioritize, and process security, compliance, and policy violations in these environments; providing temporary use of non- downloadable computer software for use in information technology system vulnerability and risk management for identifying vulnerable IT software and components and provide insights like vulnerabilities, advisories, exploits, to help users to evaluate, prioritize, and process potential risks and findings and improve their systems; providing temporary use of non-downloadable computer software for cybersecurity and cybersecurity awareness and training to discover, prioritize, process, and resolve cybersecurity and other policy violations across IT fleet and included assets, namely, cloud systems, services, VMs, servers, containers, serverless functions, and APIs; providing temporary use of non-downloadable computer software for cloud security and internet security use in cloud deployments to help identify security risks, compliance issues, and other types of policy violations across all levels of users' cloud deployments
Computer and Scientific