Downloadable computer software for network security and cyber threat mitigation; downloadable computer software for detecting, identifying, analyzing, correlating, managing and responding to cybersecurity threats; downloadable software featuring a suite of cybersecurity software and tools; downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; downloadable software for managing the cyber security of environments combining computing devices and related networks; downloadable software for automated cyber threat protection, detection and remediation; downloadable software and applications for managing the cyber security of environments combining computing devices and related networks; downloadable software and applications for automated cyber threat protection, detection and remediation
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for SaaS, Cloud, Endpoint, and network security and cyber threat mitigation; software as a service (SAAS) services featuring software for detecting, identifying, analyzing, correlating, managing and responding to cybersecurity threats; development, installation, maintenance and updating of computer software relating to cybersecurity and cyber threat mitigation; computer security consultancy in the field of cybersecurity and cyber threat mitigation; Software as a Service (SaaS) and Platform as a Service (PaaS) services featuring software for receiving, parsing, analyzing, categorizing, securing, searching, saving, auditing, monitoring, transmitting, and sharing, computer log data received from external data sources; Platform as a Service (PaaS) services featuring a suite of cybersecurity software and tools; Software as a service (SAAS) services featuring computer network security software for managing cloud, SaaS, computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
Computer and Scientific