79291638
Feb 16, 2020
Apr 27, 2021
Active Trademark
Recorded big data security software; Recorded computer software for the protection of identities and data in public cloud applications, by analyzing enterprises needs and providing visibility of identities, entitlements and data usage, to power access policy definition and enforcement at scale; Recorded cloud security software that enables enterprises to enforce granular, least-privilege access policies for identities and data, to expose risks and threats and to ensure security without impacting applications continuity or speed; Recorded computer security software to prevent identity and access-based threats, define granular access policies that reduce the attack surface, implement least privilege for all access, detect and respond to suspicious access, monitor and analyze access behavior, prioritize suspicious actions based on data sensitivity and risk, optimize between enterprise requirements and security risk, automatically define policy based on normal behavior, enforce stricter policies only for sensitive data and manage security collaboratively and at scale across enterprises teams; Recorded data classification and monitoring software; Recorded computer software for the detection of threats to computer networks; Recorded threat detection software in the nature of cloud security; Recorded computer software for use in secure network operations in the nature of cloud security; Recorded computer software for use in computer security threat analysis for protecting computers, devices, security systems and applications; Recorded computer software for use in computer security threat analysis and monitoring alerts for protecting data and identity; Recorded computer software that enforces, restricts and controls the access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Recorded computer software for ensuring data security, network security and authenticating user identification; Recorded computer software for authorizing access to databases
Electrical and Scientific ApparatusData security services in the nature of cloud-based data security consulting; computer security threat analysis for protecting data and identity information; computer security threat analysis for protecting data; computer security consultation services, namely, identifying and monitoring security alerts and the response capabilities of the system; computer security threat analysis for protecting computers, devices, security systems and applications; computer security threat analysis and monitoring alerts for protecting data and identity information; designing and optimizing the computer monitoring systems for others for effective detection of security threats and response thereto; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; hosting an online community website featuring shared communications between community members interested in identity and data security; developing a public cloud security platform for identity and data security for IaaS and PaaS applications
Computer and Scientific