Downloadable computer software for discovering, analyzing, monitoring, and managing networked computers and devices; Downloadable computer software for computer network security; Downloadable computer software for management of physical networked computers and computer hardware devices and virtual networked devices; Downloadable computer software for use in accessing, viewing and monitoring industrial control system networks; Downloadable computer software for verifying compliance with security policies; Downloadable computer software for network documentation and management, namely, inventorying, monitoring, searching and reporting on networks related to Information Technology; Downloadable computer software for network security and digital data security; Downloadable computer software for managing and administering computer networks and for IT asset management; Downloadable computer software for real-time goods inventories and network monitoring; Downloadable computer software for network discovery and network security scanning; Downloadable computer software for computer security and systems management; Downloadable computer software for IT organization and management; Downloadable computer software for use with containers, virtual machines, cloud computing infrastructure including related computing environments and devices in the field of security and systems management for the purposes of protecting digital systems, networks, and data from various threats including virus and malware protection, firewall protection, intrusion detection and prevention, data encryption, identity and access management (IAM), authentication and authorization, secure network communication, patch management, security information and event management (SIEM), phishing protection, spam protection, web application security, endpoint security, mobile device security, cloud security, incident response and recovery, network monitoring and analysis, forensics and investigation, and security auditing and compliance
Electrical and Scientific ApparatusComputer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Providing on-line non-downloadable software for discovering, analyzing, monitoring, and managing networked computers and devices; Providing on-line non- downloadable software for use in monitoring of computer systems for security purposes; Providing on-line non-downloadable software for use in providing specific tools provided by software for protecting digital systems, networks, and data from various threats including virus and malware protection, firewall protection, intrusion detection and prevention, data encryption, identity and access management (IAM), authentication and authorization, secure network communication, patch management, security information and event management (SIEM), phishing protection, spam protection, web application security, endpoint security, mobile device security, cloud security, incident response and recovery, network monitoring and analysis, forensics and investigation, and security auditing and compliance, all of which can be used for cyber-security; Providing on-line non-downloadable software for use in computer security and prevention and mitigation of computer risks; Providing on-line non-downloadable software for use with databases in providing computer security and prevention and mitigation of computer risks; Software as a service (SAAS) services featuring software for use in accessing, viewing and monitoring industrial control system networks; Software as a service (SAAS) services featuring software for use in enterprise computer system management; Software as a service (SAAS) services featuring software for use in analyzing internet of things (IoT) data; Software as a service (SAAS) services featuring software for allowing users to identify and classify internet of things (IoT) systems and devices; Software as a service (SAAS) services featuring software for enterprise protection and identifying system and risk intelligence; Computer programming services for others in the field of software configuration management; Computer services, namely, remote management of information technology (IT) systems of others comprised of physical networked computers and computer hardware devices and virtual networked devices; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, on- site management of information technology (IT) systems of others comprised of physical networked computers and computer hardware devices and virtual networked devices; Consulting in the field of configuration management for computer hardware and software; Planning, design and management of information technology systems
Computer and Scientific