Downloadable computer software for analyzing application-level and code vulnerabilities across microservices and delivering risk assessment to resolve code vulnerabilities; downloadable software for analyzing applications' source code; downloadable software for detecting, reporting, mitigating and resolving vulnerabilities in applications' software code; downloadable electronic publications in the nature of white papers, research papers, and case studies in the field of application security; software for cyber security for searching, evaluating, and fixing open source and application code vulnerabilities; downloadable computer application software for cyber security for searching, evaluating, and fixing open source and application and compute software vulnerabilities; security control apparatus, namely, downloadable software applications and downloadable computer programs for analyzing application-level and code vulnerabilities across microservices and delivering risk assessment to resolve code vulnerabilities; electronic publications, recorded on digital media, and downloadable publications, namely, manuals, white papers and newsletters featuring information in the fields of cyber security, applications and open source software; apparatus for recording, transmission or reproduction of sound or images; blank digital recording media, namely, magnetic data carriers, recording discs, compact discs, and blank DVDs
Electrical and Scientific ApparatusProviding online non-downloadable computer software for analyzing application-level and code vulnerabilities across microservices and delivering risk assessment to resolve code vulnerabilities; consulting services in the field of computer application security; software as a service (SaaS) services featuring software to enable software engineers to identify and fix security bugs and vulnerabilities; scientific research and product development services in the field of software application security; software as a service (SAAS) featuring on-line non-downloadable software platform for use in software application security testing and for detecting, reporting and remediating vulnerabilities in software and applications; cloud computing services featuring software featuring for storage of data in databases in the field of computer application security; consulting services in the field of detecting vulnerabilities in software and computer applications code and describing mitigation techniques; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems and maintenance of computer software in the field of computer application security; scientific and technological services, namely, research and design in the fields of cyber security, computer software and open source software; computer services, namely, providing temporary use of online, non-downloadable cyber security and web security software for identifying, eliminating risks and resolving code vulnerabilities for application security, application security testing, supply chain security, runtime application security, cloud native application security, application programming interface (API) security, application programming interface (API) security testing, static application security testing, dynamic application security testing, source composition analysis, and software bill of materials (SBOM) creation; design and development of electronic data and application security systems; computer consultation in the field of computer and internet security; design and development of internet security computer programs and applications; design and development of computer hardware and software; consulting services in the field of software as a service; technology and computer consultancy services in the field of software for identifying, eliminating risks and resolving code vulnerabilities for application security, application security testing, supply chain security, runtime application security, cloud native application security, application programming interface (API) security, application programming interface (API) security testing, static application security testing, dynamic application security testing, source composition analysis, and software bill of materials (SBOM) creation; the provision of information, advice and consultancy relating to all of the aforesaid.
Computer and Scientific