97415987
May 18, 2022
Computer software, namely, downloadable computer programs and mobile device applications for use in controlling, monitoring, and managing user access to computer systems and software; computer software, namely, downloadable computer programs and mobile device applications for use in providing remote information technology support services; Downloadable computer software programs and computer hardware for use in assisting in security and privilege management for computer operating systems, communication protocols, and software applications; Downloadable computer software programs for use in assisting in systems administration and security of operating systems that support remote access protocols; Downloadable computer software programs for use in assisting in integrating host credentials into directories; Downloadable computer software programs for use in providing access to multiple software applications in different operating systems; Downloadable computer software programs for use in assisting in data leak protection; Downloadable computer software programs for use in assisting in cloud and virtualization monitoring and management; Downloadable computer software for management of application software configuration settings; Downloadable computer software for privileged account and vulnerability management in the field of cybersecurity; Downloadable computer software for management of computer and network systems and security, analytics and reporting of computer and network security, and computer hardware and software asset discovery and profiling in the fields of security and privilege management in cybersecurity
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring computer software for controlling, monitoring, and managing user access to computer systems and software; software as a service (SAAS) services featuring computer software for use in providing remote information technology support services; computer services, namely, technical consultation and assistance in the design, selection, implementation and use of computer networks and computer hardware and software systems for others with respect to implementing privileged access and vulnerability management systems; providing technical information in the field of computer system administration for others; computer security consulting services in the field of privileged access and vulnerability management solutions; computer technology consultation in the field of computer, network, and software application security; Providing temporary use of on-line non-downloadable computer software for management of application software configuration settings; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in security and privilege management for computer operating systems, communication protocols, and software applications; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in systems administration and security of operating systems that support remote access protocols; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in integrating host credentials into directories; Providing temporary use of on-line non-downloadable computer software programs for use in providing access to multiple software applications in different operating systems; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in data leak protection; Providing temporary use of on-line non-downloadable computer software programs for use in assisting in cloud and virtualization monitoring and management; Providing temporary use of on-line non-downloadable computer software for privileged account and vulnerability management in the field of cybersecurity
Computer and Scientific