90142212
Aug 27, 2020
Computer hardware used for computer, computer network, networked device, embedded devices and operational technology security purposes; Downloadable and recorded computer software for computer and network security, for identification, management, monitoring, analysis, and security of computers, computer networks and devices on computer networks; Downloadable and recorded computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, intrusion detection and maintenance; downloadable computer software for detecting, investigating, remediating, and responding to network and enterprise threat incidents; Downloadable and recorded computer software for detecting, blocking, and removing threats to computer and network security, determining device compliance, and segmenting computer networks for isolating devices and enforcing security protocols; Downloadable and recorded computer software for providing a continuous exchange of computer network user, device, system, application, and configuration data between a network security control platform and other network, security and application platforms, to allow the monitoring, applying compliance policy to, and modifying of computer, device, application and network states; Downloadable and recorded computer software for providing enterprise security and computer network perimeter security; Downloadable and recorded computer software for network security management and monitoring; Downloadable and recorded computer software for automating security remediation actions and managing such actions for use in computer network management, IT management, and operational technology (OT) management
Electrical and Scientific ApparatusSoftware-as-a-service (SaaS) services featuring software for computer and network security, for identification, management, monitoring, analysis, and security of computer networks, devices on computer networks, embedded devices, and operational technology; Platform-as-a-service (PaaS) featuring computer software platforms for computer and network security, for identification, management, monitoring, analysis, and security of computer networks, devices on computer networks, embedded devices, and operational technology; Software as a service (SAAS) service, namely, hosting software for use by others for detecting, blocking, and removing threats to computer and network security, determining device compliance, and segmenting computer networks for isolating devices and enforcing security protocols; Platform-as-a-service (PaaS) featuring computer software platforms for use by others for detecting, blocking, and removing threats to computer and network security, determining device compliance, and segmenting computer networks for isolating devices and enforcing security protocols; Technology consulting services in the field of computer network security, security of networked and IoT devices, enterprise security, and operational technology (OT) software, hardware, and devices; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultation in the field of security of computers, computer networks, networked IoT devices, and enterprise security; Maintenance and updating of computer software relating to computer and network security and prevention of security risks
Computer and Scientific