Computer hardware; Computer software for network intrusion prevention, network auditing, network vulnerability management, network inspection, automated alerting, quarantining, network access control, network asset detection, packet inspection, regulatory compliance analysis and management, best practices compliance analysis and management, and blocking of untrusted users from computer networks
Electrical and Scientific Apparatus