09
Computer software and hardware for performing security,
threat, and risk-management assessments, analyses, and
investigations; computer software, namely, software for
management of security breach incidents and responses;
computer software, namely, software for the protection of
digital assets from cyber warfare, computer hacking, and
computer viruses; computer software, namely, software to
monitor and collect systems and network data; computer
hardware, namely, hardware to monitor and collect systems
and network data
42
Providing and hosting a secure electronic online platform
and website featuring software that allows cyber
surveillance to assist in providing defense against data
breaches and privacy violations; computer security
consultancy in the fields of scanning and penetration
testing of computers and networks to assess information
security vulnerability; platform as a service (PAAS)
featuring computer software platforms for security
information services and customized computer security that
provides real-time analysis of security alerts generated by
network hardware and software; computer security
consultancy; computer software testing to identify security
vulnerability; computer forensic services; computer security
consulting services in the field of maintaining the security
and integrity of databases; computer network security
services and communications network security services in the
nature of network intrusion protection testing, computer
testing for vulnerability management and assessment, risk
management and assessment, data breach threat analysis, and
network threat analysis; computer and network incident
response and forensics and penetration testing; computer
security consulting services in the field of critical
incident response to information, computer, and Internet
security breaches; computer security consulting services
intended to identify, pursue, and deter threat actors;
computer security services for protecting data and
information from unauthorized access, namely, accessing,
scanning, and monitoring of reports, the Internet, public
records, and computer activity and accounts to facilitate
the detection and prevention of data breaches, identity
theft, and fraud; computer security services for protecting
data and information, namely, providing monitoring of
customer computer systems against unauthorized access;
consulting services in the field of data breach, identity
theft, and fraud risk-management and assessment services,
fraud detection, and data breach response, namely, data
breach threat assessment and simulation, data breach
vulnerability analysis and mitigation, and data breach
emergency response; consulting services in the field of
security data breach threat assessment, namely, consulting
services intended to identify, pursue, and deter data breach
threat actors
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen