9
Computer hardware; downloadable software for application security; downloadable cybersecurity software; downloadable software for providing endpoint security; downloadable computer software for data security and data protection; downloadable software for application security testing; downloadable software using artificial intelligence for cybersecurity and monitoring; downloadable software using artificial intelligence for data security consulting; downloadable software using artificial intelligence for cybersecurity risk management; downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; downloadable software using artificial intelligence for use in machine learning, cloud and data security, data access, management and collection, cyber threat detection and prevention and data risk analysis; downloadable computer software for computer network management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; downloadable software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; downloadable software for controlling network security and access, and for implementing network security policies; downloadable software for data security for use in machine-to-machine and machine-to-people communications networks; downloadable software for adaptive risk-based decision making in the field of computer security; downloadable software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable software for computer security testing; downloadable software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; downloadable software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; downloadable software for industrial attack surface management; downloadable software for computer system and computer network vulnerability testing; downloadable software for computer system security analysis using digital twins; downloadable software for segmenting computer systems and networks; downloadable data analytics software for cybersecurity and computer system threat intelligence; downloadable software for computer system and network threat detection and response; downloadable software for simulating computer system and network security breaches and attacks
42
Providing temporary use of online non-downloadable software in the field of application security and data security; Providing temporary use of online non-downloadable software for endpoint security; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity and monitoring; providing temporary use of online non-downloadable software using artificial intelligence for data security consulting; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity risk management; providing temporary use of online non-downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring artificial intelligence software for cybersecurity and monitoring; software as a service (SaaS) featuring artificial intelligence software for data security consulting; software as a service (SaaS) featuring artificial intelligence software for cybersecurity risk management; software as a service (SaaS) featuring artificial intelligence software for monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring software for application security testing; software as a service (SaaS) services featuring software for computer networking management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; software as a service (SaaS) services featuring software for data security and data protection; software as a service (SaaS) services featuring software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; software as a service (SaaS) services featuring software for controlling network security and access, and for implementing network security policies; software as a service (SaaS) services featuring software for data security for use in machine-to-machine and machine-to-people communications networks; software as a service (SaaS) services featuring cybersecurity software; software as a service (SaaS) services featuring software for adaptive risk-based decision making in the field of computer security; software as a service (SaaS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; software as a service (SaaS) services featuring software for computer security testing; software as a service (SaaS) services featuring software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; software as a service (SaaS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SaaS) services featuring software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; software as a service (SaaS) services featuring software for industrial attack surface management; software as a service (SaaS) services featuring software for computer system and computer network vulnerability testing; software as a service (SaaS) services featuring software for computer system security analysis using digital twins; software as a service (SaaS) services featuring software for segmenting computer systems and networks; software as a service (SaaS) services featuring data analytics software for cybersecurity and computer system threat intelligence; software as a service (SaaS) services featuring software for computer system and network threat detection and response; software as a service (SaaS) services featuring software for simulating computer system and network security breaches and attacks; computer security and computer network security consultancy; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to access information security vulnerabilities; computer security services, namely, restricting unauthorized access to computer networks; computer security threat analysis for protecting data and critical computer systems; computer security services in the nature of administering digital keys; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; monitoring of computer system operation by remote access; technical support services, namely, troubleshooting computer software problems, and services for the updating, maintenance, installation, repair, and customization of computer software; planning, design and implementation of computer technologies for others computer virus protection services; Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of collecting and disseminating information from computer networks about cyber threats and malware; monitoring of computer systems for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; computer network and internet security services; research in the field of cybersecurity providing information in the field of computer network and internet security; providing technical information in the field of computer software applications; providing technical information in the field of big data computer network security analytics
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen