42
Software as a service (SaaS), namely, providing temporary
use of non-downloadable software used to maintain security
over or in computer networks, web applications and/or
digital data; software as a service (SaaS), namely,
providing temporary use of non-downloadable software for
providing network, Internet, and computer security;
application service provider featuring application
programming interface (API) software for providing security,
anti-virus scanning, detection, and elimination of viruses,
worms, trojans, spyware, adware, malware and unauthorized
data and programs on computer systems, servers and
electronic devices; online computer services, namely,
scanning, detecting, quarantining and eliminating of
viruses, worms, trojans, spyware, adware, malware and
unauthorized data and programs on computers, servers and
electronic devices; software as a service (SaaS), namely,
providing temporary use of non-downloadable software for
emulating attack methods used by computer hackers; software
as a service (SaaS), namely, providing temporary use of
non-downloadable software for use in measuring security
awareness, email security awareness and susceptibility to
phishing attacks, enterprise risk assessment and management,
IT risk assessment and management, and compliance risk
assessment and management; software as a service (SaaS),
namely, providing temporary use of non-downloadable software
for providing security assessments of information systems
and human susceptibility to malicious electronic mail
attempting to obtain confidential information or deliver
malware or other unauthorized software, data or programs;
software as a service (SaaS), namely, providing temporary
use of non-downloadable software for computer security risk
and threat analysis, assessment, and management; software as
a service (SaaS), namely, providing temporary use of
non-downloadable software for emulating attack methods used
by computer hackers, measuring the metrics and performance
of software users, and providing training modules to
software users who demonstrate susceptibility to malicious
electronic mail attempting to obtain confidential
information or deliver malware or other unauthorized
software, data or programs for information systems security
education and training; software as a service (SaaS),
namely, providing temporary use of non-downloadable software
for cybersecurity training and reporting purposes, namely,
to train employees and others how to identify, report, and
avoid cybersecurity threats; software as a service (SaaS),
namely, providing temporary use of non-downloadable software
for use in measuring security awareness, email security
awareness and susceptibility to phishing attacks, enterprise
risk assessment and management, IT risk assessment and
management, and compliance risk assessment and management