98038496
Jun 12, 2023
Downloadable software for security and compliance automation, continuously monitoring and collecting evidence of a company's security controls, and streamlining workflows to ensure audit-readiness; Downloadable computer software for computer network security and for monitoring and identifying computer network users and cloud, mobile or network applications and computer hardware and the network activities of computer users and cloud, mobile or network applications and computer hardware; Downloadable and recorded computer software and computer hardware for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; Downloadable computer software for providing data and information assurance and security, information security policy validation and enforcement; Downloadable software for computer network security; Downloadable computer software for management of physical and virtual devices connected to a network for the detection of unauthorized access and data breaches and for authorization management
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security; Computer security support services; Software as a service services (SaaS) featuring software for monitoring, analyzing, auditing, automating, identification, discovery, centralization, unification, management, optimization, integration, and security of users, actions, data, software and files; Software as a service services (SaaS) featuring software for identifying and reporting security threats, automating remediation on breaches of security policies, enforcing security policies, eliminating security vulnerabilities, security compliance monitoring, managing access rights and providing alerts and notifications; Design, development and implementation of software in the field of data and network security; design, development and implementation of software in the fields of cloud, mobile or network applications; information technology support services, namely, monitoring network systems via information technology service support centers and helpdesks; Computer network security services, namely, management of an organization's IT asset inventory and infrastructure to optimize performance and identify and remediate security issues; monitoring of computer systems of network-connected physical and virtual devices by remote access for the detection of unauthorized access and data breaches and for authorization management; monitoring of computer systems of network-connected physical and virtual devices for detecting unauthorized access or data breach
Computer and Scientific