9
Computer programs and software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, and endpoints including fixed function devices; computer programs and software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks and endpoints including fixed function devices; computer programs for use, including on a real-time basis, in tracking software, data files, and executable files in computer networks and endpoints including fixed function devices,for use in identifying unauthorized, new or unknown software, data files, and executable files, and for blocking unauthorized software executions and data access; computer programs for use as an online search engine and as a downloadable utility program; computer programs for preventing viruses and unauthorized access to computer systems, computer networks, and endpoints including fixed function devices; software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data and communications and endpoints including fixed function devices; intrusion detection software
42
Computer security services; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, and endpoints including fixed function devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, and endpoints including fixed function devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, and endpoints including fixed function devices; infrastructure as a service (IAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; infrastructure as a service (IAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, and endpoints including fixed function devices; computer services, namely, tracking software, data files, and executable files in computer networks and endpoints including fixed function devices, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis; providing non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, and endpoints, including fixed function devices; providing non-downloadable intrusion detection software