Downloadable software for user authentication and identity verification in the field of cybersecurity; downloadable software for authentication management, database management, subscription management, and user management
Electrical and Scientific ApparatusTechnical consulting in the field of cybersecurity risk management training; technical consulting in the field of credential-less user software authentication and authentication management services training
Education and EntertainmentSoftware as a service (SaaS) services featuring software used for user authentication and verification; Software as a service (SaaS) services, namely, hosting software for data security purposes by providing authentication; Software as a service (SaaS) services featuring software for user authentication and identity verification in the field of cybersecurity; Software as a service (SaaS) services, namely, hosting software for database management, subscription management, user management, and authentication management; Authentication services using sign on technology in the field of credential-less user authentication services and user data security transmitted via telecommunications; User authentication services using sign-on technology for online software applications; User authentication services using blockchain technology for online transactions; user authentication and identification verification services using sign on technology; user authentication and identification verification services using sign on technology in the field of cybersecurity; user authentication of identification information services using sign on technology; Providing user authentication services using sign on technology in network access, enterprise network access, platform access, online transactions, e-commerce transactions; Software as a service (SaaS) featuring software for fraud detection, fraud prevention, and fraud analytics; design and development of computer software for fraud detection, fraud prevention, and fraud analytics; Consulting services in the field of maintaining the security and integrity of networks and databases; Technology consultation in the fields of cybersecurity, software authentication, and digital integrity
Computer and Scientific