Downloadable software for detecting, analyzing, reporting on, and protecting computer networks and systems from cyber-attacks, including malware; Downloadable software for visualizing cyber-attacks and providing data on cyber-attacks; Downloadable software for tracking, collecting, and analyzing the activities of users of computer networks and systems and for detecting malicious activities on computer networks and systems; Downloadable software for detecting and analyzing the infrastructure of computer networks and systems, including identifying devices that are not under management; Downloadable software for evaluating the performance of security measures used to protect computer networks and systems; Downloadable software for performing security audits of computer networks and systems
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for detecting, analyzing, reporting on, and protecting computer networks and systems from cyber-attacks, including malware; Software as a service (SAAS) services featuring software for visualizing cyber-attacks and providing data on cyber-attacks; Software as a service (SAAS) services featuring software for tracking, collecting, and analyzing the activities of users of computer networks and systems and for detecting malicious activities on computer networks and systems; Software as a service (SAAS) services featuring software for detecting and analyzing the infrastructure of computer networks and systems, including identifying devices that are not under management; Software as a service (SAAS) services featuring software for evaluating the performance of security measures used to protect computer networks and systems; Software as a service (SAAS) services featuring software for performing security audits of computer networks and systems; Technology advisory services related to cybersecurity; Technological planning and consulting services in the field of cybersecurity; Scientific and technological services, namely, assessing and managing technological threats and vulnerabilities, simulating potential technological threats, and evaluating existing technological defenses in the field of cybersecurity
Computer and Scientific