Downloadable computer software for computer network security, communications network security and data security; Downloadable computer software for detecting, monitoring, containing, and controlling active threats and attacks on, and unauthorized access to, computers and computer networks, and for identifying, detecting, blocking, reporting and removing threats, intrusions, malware and malicious attacks; Downloadable computer software for computer network security, communications network security anetwork intrusion detection, monitoring, and preventionnd data security; Downloadable computer software for network intrusion detection, monitoring, and prevention; Downloadable computer programs for monitoring the performance of computer systems; Recorded computer programs for monitoring the performance of computer systems
Electrical and Scientific ApparatusMonitoring of computer systems to detect breakdowns; Monitoring of computer systems to detect cybersecurity incidents; Monitoring of computer system operation by remote access; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Software as a service (SAAS) services featuring software for computer network security, communications network security and data security; Software as a service (SAAS) services featuring software for detecting, monitoring, containing, and controlling active threats and attacks on, and unauthorized access to, computers and computer networks, and for identifying, detecting, blocking, reporting and removing threats, intrusions, malware and malicious attacks; Software as a service (SAAS) services featuring software for computer network security, communications network security and data security; Software as a service (SAAS) services featuring software for network intrusion detection, monitoring, and prevention; Providing on-line non-downloadable software for Providing on-line non-downloadable software for; Providing on-line non-downloadable software for network intrusion detection, monitoring, and prevention; Providing on-line non-downloadable software for detecting, monitoring, containing, and controlling active threats and attacks on, and unauthorized access to, computers and computer networks, and for identifying, detecting, blocking, reporting and removing threats, intrusions, malware and malicious attacks; Platform as a service (PAAS) featuring computer software platforms for computer network security, communications network security and data security; Platform as a service (PAAS) services featuring software platforms for the transmission of detecting, monitoring, containing, and controlling active threats and attacks on, and unauthorized access to, computers and computer networks, and for identifying, detecting, blocking, reporting and removing threats, intrusions, malware and malicious attacks; Platform as a service (PAAS) featuring computer software platforms for network intrusion detection, monitoring, and prevention; Technological planning and consulting services in the field of computer network security, communications network security, data security, cybersecurity research, and cybersecurity risk management
Computer and Scientific