9
downloadable computer software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; for detecting and mitigating security threats directed toward users, endpoints, applications and data, for securing data during access to a computer network,for securing connectivity to a computer network, for securing computing hardware and software located at the edge of a network,for blocking access to and from malicious websites and links, for secure remote access to a network, for on-premises or cloud-based security policy enforcement,for capturing, storing, presenting credentials for authentication to multiple computer services,for enterprise digital rights management and for phishing and content protection
42
Providing online non-downloadable software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection, for detecting and mitigating security threats directed toward users, endpoints, applications and data; Providing online non-downloadable software for identifying and protecting data which is transmitted in electronic form or otherwise, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links, for secure remote access to a network; Providing online non-downloadable software for identifying and protecting data which is transmitted in electronic form or otherwise, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Software as a Service (SaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection, for detecting and mitigating security threats directed toward users, endpoints, applications and data; Software as a Service (SaaS) featuring software for identifying data which is transmitted in electronic form or otherwise, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links, for secure remote access to a network; Software as a Service (SaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Connectivity as a Service (CaaS) featuring software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection; Connectivity as a Service (CaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise for detecting and mitigating security threats directed toward users, endpoints, applications and data, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links; Connectivity as a Service (CaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise for secure remote access to a network, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Platform as a Service (PaaS) featuring software for identifying data which is transmitted in electronic form or otherwise, for the purpose of network security and protection, endpoint security and protection, cloud security and protection, or data security and protection, for detecting and mitigating security threats directed toward users, endpoints, applications and data; Platform as a Service (PaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for securing connectivity to a computer network, for securing data during access to a computer network, for securing computing hardware and software located at the edge of a network, for blocking access to and from malicious websites and links, for secure remote access to a network; Platform as a Service (PaaS) featuring software for identifying and protecting data which is transmitted in electronic form or otherwise, for on-premises or cloud-based security policy enforcement, for capturing, storing, presenting credentials for authentication to multiple computer services, for enterprise digital rights management, and for phishing and content protection; Hardware as a Service (HaaS), namely, providing a software-defined wide area network (SD-WAN) and software-defined web gateway; Computer consultancy services, namely, computer software consultancy, computer technology consultancy