Downloadable computer software for monitoring, assessing and tracking behaviors and patterns to identify risks, threats and security breaches for business and in the workplace; Downloadable computer software for assessment of vulnerabilities and communication compliance for businesses and in the workplace; Downloadable computer software for inputting and accessing data to track people and assets in the event of a crisis; Downloadable computer software for monitoring computer network behavioral patterns to detect security threats; Downloadable computer software for encrypting and authenticating data; Downloadable computer software for monitoring, measuring, tracking and reporting computer network behavioral patterns to discover risks, correlate security information, assess vulnerabilities, and managing and communicating compliance; Downloadable computer software for security; Downloadable computer software for verifying compliance with security policies; Downloadable computer software for operational risk management; Downloadable bibliographic data banks; Downloadable dynamic data banks in the field of assessing vulnerabilities, ensuring communication compliance, and monitoring, assessing and tracking behaviors and patterns to identify risks, threats and security breaches; Computer hardware and recorded software systems for monitoring computer network behavioral patterns to detect security threats; Computer hardware and recorded software systems for monitoring, measuring, tracking and reporting computer network behavioral patterns to discover risks, correlate security information, assess vulnerabilities, and managing and communicating compliance; Computer hardware
Electrical and Scientific ApparatusBusiness risk management; Business auditing; Business risk management services; Business risk assessment services; Disaster recovery services, namely, business planning and business continuity consulting; Business consulting services in the field of security risk management
Advertising and BusinessRegulatory compliance auditing; Legal compliance auditing; Reviewing standards and practices to assure compliance with privacy and security laws and regulations; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Monitoring of computer systems in the nature of surveillance services relating to the physical safety of persons and security of tangible property; Forensic analysis of surveillance video for fraud and theft prevention purposes; Private investigation services; Detective investigations; Surveillance services; Pre-employment background screening; Personal background investigations; Pre-employment background investigation services; Surveillance services relating to the physical safety of individuals and security of tangible property; Investigation services relating to the physical safety of individuals and security of tangible property
Personal