security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems; downloadable privileged access management computer software for use in controlling, monitoring and managing user access to computer systems and software, computer software for managing and securing passwords and sensitive information; computer software for managing software encryption keys; computer software for managing digital public key identity certificates that allow secure exchange of data over the Internet; software for blocking detected phishing sites in email links and web browsing; Downloadable computer software for use in initiating, monitoring and recording privileged sessions between users and computer hardware and software systems, initiating privileged sessions between users and computer hardware and software systems without revealing passwords to the end user, and recording usage of administrative and privileged accounts and activities performed by users during privileged sessions and including a playback feature of such recordings
Electrical and Scientific Apparatusnon-downloadable security software, namely, anti-malware, anti-phishing, and anti-hacking software, non-downloadable security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; non-downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; non-downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; non-downloadable training simulation software in the field of analyzing, detecting and preventing digital and online threats consisting of computer virus, malware and phishing attacks
Computer and Scientific