Downloadable software for simulating cyberattacks and other computer, computer network, phone, email account, and social media account attacks and threats to identify and assess system vulnerabilities and to help executives, employees, users, and contractors to prepare against real attacks and threats; Downloadable software for automating testing to determine whether executives, employees, users, and contractors know how to respond to cyberattacks and other computer, computer network, phone, email account, and social media account attacks and threats; Downloadable software for computer, computer network, phone, email account, and social media account security services in the nature of analyzing, categorizing, alerting regarding, and taking down threats; Downloadable software for electronic monitoring of personally identifying information to detect identity theft via the Internet, assess threats, provide real-time alerting, and remove detected information; Downloadable software utilizing artificial intelligence for safeguarding executive, employee, user, and contractor information and data; Downloadable software utilizing artificial intelligence for computer, computer network, phone, email account, and social media account threat analysis and for protecting data; Downloadable software utilizing artificial intelligence for computer, computer network, phone, email account, and social media account protection through identifying and flagging potential threats, warning executives, employees, users, and contractors, and taking down or removing threats; Downloadable software for reviewing, responding to, and escalating executive, employee, user, and contractor communications regarding potential threats to computers, computer networks, phones, email accounts, and social media accounts
Electrical and Scientific ApparatusProviding online non-downloadable software utilizing artificial intelligence for computer, computer network, phone, email account, and social media account protection through identifying and flagging potential threats, warning executives, employees, users, and contractors, and taking down or removing threats; Providing online non-downloadable software for computer, computer network, phone, email account, and social media account security services in the nature of analyzing, categorizing, alerting regarding, and taking down threats; Providing online non-downloadable software utilizing artificial intelligence for safeguarding executive, employee, user, and contractor information and data; Providing online non-downloadable software for electronic monitoring of personally identifying information to detect identity theft via the Internet, assess threats, provide real-time alerting, and remove detected information; Providing online non-downloadable software for reviewing, responding to, and escalating executive, employee, user, and contractor communications regarding potential threats to computers, computer networks, phones, email accounts, and social media accounts; Providing online non-downloadable software for simulating cyberattacks and other computer, computer network, phone, email account, and social media account attacks and threats to identify and assess system vulnerabilities and to help executives, employees, users, and contractors to prepare against real attacks and threats; Providing online non-downloadable software utilizing artificial intelligence for computer, computer network, phone, email account, and social media account threat analysis and for protecting data; Providing online non-downloadable software for automating testing to determine whether executives, employees, users, and contractors know how to respond to cyberattacks and other computer, computer network, phone, email account, and social media account attacks and threats
Computer and Scientific