97817376
Mar 1, 2023
downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network
Electrical and Scientific Apparatussoftware as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; healthcare transaction fraud detection and prevention technologies and services, namely, identification verification software and computer security services for providers and users of health care services; healthcare transaction authentication and verification services, namely, identification verification software and computer security services for providers and users of health care services
Computer and Scientific