Computer hardware and software in the fields of computer security for use in keeping computers, software and networks secure; computer software for computer security policy assessment; computer software for computer technical support services; computer software for computer vulnerability assessments; computer software for cybersecurity diagnostics services; computer software for cybersecurity maintenance services; computer software for maintaining cybersecurity of computers, software and hardware; computer software for cybersecurity policy assessment; computer software for cybersecurity technical support services; computer software for cybersecurity vulnerability assessments; computer software for data security diagnostics services; computer software for data security maintenance services; computer software for maintaining data security of computers, software and hardware; computer software for data security policy assessment; computer software for data security technical support services; computer software for data security vulnerability assessments; computer software for endpoint detection and response; computer software for firewall security assessments; computer software for firewall security diagnostics services; computer software for firewall security maintenance services; computer software for firewall security; computer software for firewall security policy assessment; computer software for firewall security technical support services; computer software for firewall security vulnerability assessments; computer software for computer hardware diagnostics services; computer software for computer hardware maintenance services; computer software for computer hardware security; computer software for computer hardware security policy assessment; computer software for computer hardware technical support services; computer software for hardware vulnerability assessments; computer software for information technology diagnostics services; computer software for information technology maintenance services; computer software for information technology security; computer software for information technology security policy assessment; computer software for information technology technical support services; computer software for information technology vulnerability assessments; computer software for managed detection and response to cyber-attacks, data security exceptions and policy exceptions; computer software for a managed security service provider; computer software for computer network diagnostics services; computer software for computer network maintenance services; computer software for computer network security; computer software for computer network security policy assessment; computer software for computer network technical support services; computer software for computer network vulnerability assessments; computer software for software or hardware password diagnostics services; computer software for software or hardware password maintenance services; computer software for software or hardware password security; computer software for software or hardware password security policy assessment; computer software for software or hardware password technical support services; computer software for software or hardware password vulnerability assessments; computer software for preventing cybersecurity and unauthorized data access; computer software for software-implemented security policy assessment; computer software for support services, namely, diagnosing computer software and hardware problems, diagnosing computer security problems; computer software for cyber and data vulnerability assessments; computer software for penetration testing of cyber threats and data access threats; computer software for cyber and data security operations center management; computer software for software diagnostics services; computer software for software maintenance services; computer software for software security policy assessments; computer software for software technical support services; computer software for software vulnerability assessments; computer software for computer operating software, applications software, computer hardware and computer network vulnerability assessments; Computer hardware diagnostic services; computer network diagnostic services; computer network security policy assessment; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultancy; computer security policy assessment; computer security, namely, cybersecurity policy assessment; computer security, namely, data security policy assessment; computer security, namely, firewall security policy assessment; computer security, namely, hardware security policy assessment; computer security, namely, information technology security policy assessment; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer software and hardware password maintenance services; computer software maintenance services; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity computer software maintenance services; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; data security computer software maintenance services; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; firewall computer software security maintenance services; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security, namely, security threat analysis for protecting data; hardware support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware and software maintenance services; information technology security, namely, security threat analysis for protecting data; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of non- downloadable software for security operations center management; security policy assessment, namely, data security consultancy; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; support services, namely, troubleshooting of computer software security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; Troubleshooting of security problems in the nature of security threat analysis for protecting public safety or personal safety
Electrical and Scientific Apparatus