downloadable computer software for computer network security; downloadable software for detecting, identifying, tracking, blocking, removing, analyzing, reporting and managing computer security threats and malware; downloadable software for creating and maintaining firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network end point intrusion protection (EPP) to prevent unauthorized access to and use of computer networks and systems; downloadable software for providing security for email, internet and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic viruses, spam, spyware, malware, and other undesirable content; downloadable software for secure storage and management of identity and computer network access management data credentials; downloadable software for computer and network security policy, governance, risk and compliance administration and enforcement; Recorded computer software, namely, artificial intelligence (AI) decision analysis software for management of security data breach incidents and security operations center (SOC) remediation services, for use in the fields of computer and computer network security, forensic, diagnostic, business economic impact, and education pertaining to information, computer and incident security; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, malware infection, and computer viruses
Electrical and Scientific ApparatusComputer security consulting; consulting in the field of information technology; consultation for protecting data and information from unauthorized access in the field of computer and network security, identifying malware on computer systems, identifying the source and creation origins of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security to prevent against unauthorized access or data breach; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security, namely, consulting services in the field of cloud computing; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; platform as a service (PaaS) services featuring computer software platforms for detecting blocking, and removing computer viruses and threats; application service provider (ASP) featuring online non-downloadable computer software for use in computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
Computer and Scientific