9
Computer software and hardware, namely, software and hardware for centralized identification, acquisition, storage, encryption, management, manipulation, joining, analysis and reporting of computer data, computer network data, mobile device data, metadata, files, information and security breach incidents, as well as collection, analysis and monitoring of network traffic, for use in fields of cybersecurity, analytics, computer forensics, e-discovery and litigation; computer software and hardware for detecting, reporting, analyzing and eliminating cyber incidents, such as malware, unauthorized software and network attacks; computer software and hardware system for identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer data and computer network data, metadata, files, information and security breach incidents, for use in security and system intrusion assessment, investigation of damage to or unauthorized use of computer data and files, diagnostics, forensic data investigation, electronic evidence discovery and business loss valuation; computer hardware and software for creating searchable databases of information and data and managing storage devices in a networked environment; computer hardware and downloadable software for litigation support, namely, collecting, storing, sharing, reviewing, searching, managing, categorizing and coding documents