97412363
May 16, 2022
Downloadable software for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Downloadable software for digital forensics; Downloadable computer software for collecting, monitoring, tagging, analyzing, decoding, viewing, reporting, visualizing, storing electronic data regarding, and detecting variations in, computer and computer network activity; Downloadable software for computer and computer network security information and event management; Downloadable software for collecting, managing, monitoring, analyzing, reporting, and storing computer log data; Downloadable software for supporting computer and computer network security policy compliance and regulatory compliance; Downloadable software for monitoring for, detecting, and responding to electronic threats to computer network endpoints; Downloadable software using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Downloadable software for orchestrating manual and automated workflows and responses to computer and computer network security threats; Downloadable software for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats; Downloadable computer software for detecting and responding to cybersecurity threats, namely, software for security information and event management (SIEM), extended detection and response (XDR), security analytics, security monitoring, security operations, computer network endpoint security, cybersecurity incident response, and cloud security
Electrical and Scientific ApparatusSoftware as a service (SaaS), namely, a cloud-based computer software for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Cloud computing featuring software for digital forensics; Cloud computing featuring software for computer and computer network security information and event management; Cloud computing featuring software for collecting, managing, monitoring, analyzing, reporting, and storing computer log data; Cloud computing featuring software for supporting computer and computer network security policy compliance and regulatory compliance; Cloud computing featuring software for monitoring for, detecting and responding to electronic threats to computer network endpoints; Cloud computing featuring software using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Cloud computing featuring software for orchestrating manual and automated workflows and responses to computer and computer network security threats; Cloud computing featuring software for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats; Cloud computing featuring software for detecting and responding to cybersecurity threats, namely, security information and event management (SIEM), extended detection and response (XDR), security analytics, security monitoring, security operations, computer network endpoint security, cybersecurity incident response, and cloud security; Cloud computing featuring software for collecting, monitoring, tagging, analyzing, decoding, viewing, reporting, visualizing, storing electronic data regarding, and detecting variations in, computer and computer network activity
Computer and Scientific