Downloadable computer security software, namely, software for cyber security monitoring and control of network activities on a computer; downloadable computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cyber security; downloadable computer software for calculating and simulating security breaches while providing suggestions to protect cyber security; downloadable computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable computer software for integrating employees' awareness, including employees' behavioral response patterns; downloadable computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable computer software for adjusting and prioritizing security roadmap; downloadable computer software restricting unauthorized access to computer systems as part of information security management
Electrical and Scientific ApparatusEducational services, namely, providing online, non-downloadable educational video programs in the field of cyber security training
Education and EntertainmentSoftware as a service (saas) services, namely, hosting computer software for use by others for cyber security monitoring and control of network activities on a computer; software as a service (saas) services, namely, hosting computer security software for use by others for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cyber security; software as a service (saas) services, namely, hosting computer software for use by others for calculating and simulating security breaches while providing suggestions to protect cyber security; software as a service (saas) services, namely, hosting computer software for use by others for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; software as a service (saas) services, namely, hosting computer software for use by others for integrating employees' awareness, including employees' behavioral response patterns; software as a service (saas) services, namely, hosting computer software for use by others for providing real-time, on-demand comprehensive configuration and vulnerability assessments; software as a service (saas) services, namely, hosting software for use by others for adjusting and prioritizing security roadmap; software as a service (saas) services, namely, hosting computer software for use by others for restricting unauthorized access to computer systems as part of information security management
Computer and Scientific