Computer application software for the management of cyber security, from network to device, namely, software for the collection and analysis of network and device endpoint logs and combining data points from disparate sources to provide a near-real-time prioritized response list
Electrical and Scientific Apparatus