Downloadable software for monitoring computer systems for detecting unauthorized access or data breach, navigating threat intelligence, and running cyber threat assessments, and orchestrating response actions; Downloadable software for use in the field of cybersecurity, namely, providing tools for IT risk management, network analysis, and threat identification and protection; Downloadable computer software, namely, software for detecting, assessing, and remediating vulnerabilities to prevent Internet of Things (IoT) devices and artificial intelligence (AI) from launching network attacks and cybersecurity threats
Electrical and Scientific ApparatusSoftware as a service, namely, hosting for use by others a software interface for detecting unauthorized access or data breach, navigating threat intelligence, running cyber threat assessments, and orchestrating response actions; Software as a service featuring software for use in the field of cybersecurity, namely, providing software tools for IT risk management, network analysis, and threat identification and protection; Software as a Service (SaaS) services, featuring software for detecting, assessing, and remediating vulnerabilities to prevent Internet of Things (IoT) devices and artificial intelligence (AI) from launching network attacks and cybersecurity threats
Computer and Scientific