97520702
Jul 26, 2022
Downloadable computer software, namely, downloadable computer software for computer, data, and computer network security, identity and access management and verification, privilege and permissions access management and verification, and cloud infrastructure entitlements management (CIEM), downloadable computer software to secure, manage, and govern access to computer systems, platforms, networks, databases, applications, websites, devices, and other online resources, downloadable computer software to identify, evaluate, remediate, monitor, and govern permission risks and to manage, secure, authenticate, automate, and verify all identities, workload identities, certificates, actions, and resources across cloud, hybrid, and multi-cloud environments, downloadable computer software to implement, manage, automate, and govern security policies and automatically intelligently adapt based on real-time risk assessments and insights, downloadable computer software to create, issue, restrict, and verify decentralized identity credentials and to digitally validate information and invalidate credentials, downloadable computer software to automate verification of identity credentials and enable privacy protected online interactions between organizations and users, downloadable computer software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information in the field of cybersecurity, downloadable computer software for monitoring of cloud systems for anomalous activity, outliers, vulnerabilities, misconfigurations, and compliance violations, downloadable computer software to detect, prevent, and mitigate data breach risks and cybersecurity attacks, reduce attack surfaces, and protect privacy, downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, reducing risks, generating security reports, providing security alerts, and for security and regulatory compliance, downloadable computer software for cloud security, protection of cloud-based information, database management, data security, risk assessment and monitoring of cloud systems, detection and remediation of machine and user privileges, multifactor authentication, and detection and prevention of unauthorized user access and computer data breaches, downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and access policies, downloadable computer software for digital threat information management, cloud platform security management and auditing, user account protection and prevention of unauthorized access to web applications and cloud applications, downloadable computer software for enforcing, restricting, and controlling access privileges of machines and users of computing resources for cloud, mobile, and network resources, and downloadable computer software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; all of the foregoing excluding electronic communications software for the delivery of broadband data and video services and software used to configure and monitor access nodes and legacy adapters
Electrical and Scientific ApparatusSoftware as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for computer, data, and computer network security, identity and access management and verification, privilege and permissions access management and verification, and cloud infrastructure entitlements management (CIEM), providing temporary use of online non-downloadable computer software to secure, manage, and govern access to computer systems, platforms, networks, databases, applications, websites, devices, and other online resources, providing temporary use of online non-downloadable computer software to identify, evaluate, remediate, monitor, and govern permission risks and to manage, secure, authenticate, automate, and verify all identities, workload identities, certificates, actions, and resources across cloud, hybrid, and multi-cloud environments, providing temporary use of online non-downloadable computer software to implement, manage, automate, and govern security policies and automatically intelligently adapt based on real-time risk assessments and insights, providing temporary use of online non-downloadable computer software to create, issue, restrict, and verify decentralized identity credentials and to digitally validate information and invalidate credentials, providing temporary use of online non-downloadable computer software to automate verification of identity credentials and enable privacy protected online interactions between organizations and users, providing temporary use of online non-downloadable computer software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information in the field of cybersecurity, providing temporary use of online non-downloadable computer software for monitoring of cloud systems for anomalous activity, outliers, vulnerabilities, misconfigurations, and compliance violations, providing temporary use of online non-downloadable computer software to detect, prevent, and mitigate data breach risks and cybersecurity attacks, reduce attack surfaces, and protect privacy, providing temporary use of online non-downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, reducing risks, generating security reports, providing security alerts, and for security and regulatory compliance, providing temporary use of online non-downloadable computer software for cloud security, protection of cloud-based information, database management, data security, risk assessment and monitoring of cloud systems, detection and remediation of machine and user privileges, multifactor authentication, and detection and prevention of unauthorized user access and computer data breaches, providing temporary use of online non-downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and access policies, providing temporary use of online non-downloadable computer software for digital threat information management, cloud platform security management and auditing, user account protection and prevention of unauthorized access to web applications and cloud applications, providing temporary use of online non-downloadable computer software for enforcing, restricting, and controlling access privileges of machines and users of computing resources for cloud, mobile, and network resources, and providing temporary use of online non-downloadable computer software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; all of the foregoing excluding non-downloadable electronic communications software for the delivery of broadband data and video services and non-downloadable software used to configure and monitor access nodes and legacy adapters
Computer and Scientific