09
Computer software used to maintain security over or in
computer networks, web applications and/or digital data;
computer software for providing network, Internet, and
computer security; computer software for providing security,
anti-virus scanning, detection, and elimination of viruses,
worms, trojans, spyware, adware, malware and unauthorized
data and programs on computer systems, servers and
electronic devices; computer software for scanning,
detecting, quarantining and eliminating of viruses, worms,
trojans, spyware, adware, malware and unauthorized data and
programs on computers, servers and electronic devices;
computer software for emulating attack methods used by
computer hackers; computer software for use in measuring
security awareness, email security awareness and
susceptibility to phishing attacks, enterprise risk
assessment and management, IT risk assessment and
management, and compliance risk assessment and management;
computer software for providing security assessments of
information systems and human susceptibility to malicious
software and communications attempting to obtain
confidential information or deliver malware or other
unauthorized software, data or programs; computer software
for computer security risk and threat analysis, assessment,
and management; computer software for emulating attack
methods used by computer hackers, measuring the metrics and
performance of software users, and providing training
modules to software users who demonstrate susceptibility to
malicious electronic mail attempting to obtain confidential
information or deliver malware or other unauthorized
software, data or programs for information systems security
education and training; computer software for cybersecurity
training and reporting purposes, namely, to train employees
and others how to identify, report, and avoid cybersecurity
threats; computer software for use in measuring security
awareness, email security awareness and susceptibility to
phishing attacks, enterprise risk assessment and management,
IT risk assessment and management, and compliance risk
assessment and management; computer software for allowing
search for, identification, and removal of specified emails
42
Software as a service (SaaS), namely, providing temporary
use of non-downloadable software used to maintain security
over or in computer networks, web applications and/or
digital data; software as a service (SaaS), namely,
providing temporary use of non-downloadable software for
providing network, Internet, and computer security;
application service provider featuring application
programming interface (API) software for providing security,
anti-virus scanning, detection, and elimination of viruses,
worms, trojans, spyware, adware, malware and unauthorized
data and programs on computer systems, servers and
electronic devices; online computer services, namely,
scanning, detecting, quarantining and eliminating of
viruses, worms, trojans, spyware, adware, malware and
unauthorized data and programs on computers, servers and
electronic devices; software as a service (SaaS), namely,
providing temporary use of non-downloadable software for
emulating attack methods used by computer hackers; software
as a service (SaaS), namely, providing temporary use of
non-downloadable software for use in measuring security
awareness, email security awareness and susceptibility to
phishing attacks, enterprise risk assessment and management,
IT risk assessment and management, and compliance risk
assessment and management; software as a service (SaaS),
namely, providing temporary use of non-downloadable software
for providing security assessments of information systems
and human susceptibility to malicious electronic mail
attempting to obtain confidential information or deliver
malware or other unauthorized software, data or programs;
software as a service (SaaS), namely, providing temporary
use of non-downloadable software for computer security risk
and threat analysis, assessment, and management; software as
a service (SaaS), namely, providing temporary use of
non-downloadable software for emulating attack methods used
by computer hackers, measuring the metrics and performance
of software users, and providing training modules to
software users who demonstrate susceptibility to malicious
electronic mail attempting to obtain confidential
information or deliver malware or other unauthorized
software, data or programs for information systems security
education and training; software as a service (SaaS),
namely, providing temporary use of non-downloadable software
for cybersecurity training and reporting purposes, namely,
to train employees and others how to identify, report, and
avoid cybersecurity threats; software as a service (SaaS),
namely, providing temporary use of non-downloadable software
for use in measuring security awareness, email security
awareness and susceptibility to phishing attacks, enterprise
risk assessment and management, IT risk assessment and
management, and compliance risk assessment and management;
software as a service (SaaS), namely, providing temporary
use of non-downloadable software for allowing search for,
identification, and removal of specified emails