09
Network security appliance comprised of computer hardware
and artificial intelligence-based software for identifying,
analyzing, visualizing, tracking, and collecting information
on network security incidents and network traffic, and
providing customized cyber security, governance, risk and
compliance response options; network security appliance
comprised of computer hardware and software featuring
dashboard software for searching, mapping and graphing
network devices and security threats, producing security
incident reports, monitoring, tracking and managing computer
and network security and providing trend visualization and
analytics regarding computer and network security threats;
artificial-intelligence based network security software that
detects and prioritizes mal-intent and behavioral threats
from internal and external sources and performs autonomous
incident triage; computer software for use in protecting and
managing enterprise security; computer software for digital
security; computer software and software platform for
monitoring enterprise networks and computer systems to
protect against malicious attacks; computer software for
monitoring data and communications for security purposes;
computer software for protecting private information on
enterprise networks; computer software for implementing
computer, software and network security measures; computer
software for monitoring and detecting security breaches;
computer software that provides intrusion alert, threat
protection and other security functions; anti-malware
software applications; computer software for providing
network, Internet, and computer security; computer software
for scanning, detecting, remediating and removing viruses,
worms, trojans, adware, spyware, rootkits, backdoors,
zero-day attacks, data exfiltration, phishing, bots, time
bombs, cyber-attacks, malicious attacks, advanced persistent
threats and other malware; Internet security software,
including computer software for use in the monitoring and
control of computer and online activity; computer software
for identifying and preventing malicious attacks on, and
unauthorized activities and intrusions in computers,
computer systems, networks, hardware, software applications,
digital devices, and mobile devices; computer software
providing secure networks; computer software for security
analytics; computer software for network traffic analysis;
computer software for network detection and response;
computer software for threat investigations and incident
response; computer software for threat hunting
41
On-line journals, namely, blogs in the field of information
technology security and vulnerability
42
Information technology troubleshooting, namely,
investigation, research and diagnosis of computer system and
computer network threats; computer consultation in the field
of computer security to detect and assess information
security vulnerability; computer security services, namely,
on-line scanning, detecting, quarantining and eliminating of
viruses, worms, trojans, adware, spyware, rootkits,
backdoors, zero-day attacks, data exfiltration, phishing,
bots, time bombs, cyber-attacks, malicious attacks, advanced
persistent threats, malware and unauthorized data and
programs on computers, computer systems, networks, hardware,
software applications, digital devices, and mobile devices;
computer security services for protecting and managing
enterprise networks; computer security services, namely,
restricting and detecting unauthorized access to enterprise
computer networks; technical support and consulting services
related to security and vulnerability of, and cyber-attacks
and threats against computers, computer systems, networks,
hardware, software applications, digital devices, digital
data, and mobile devices; technical and consulting services
related to designing, developing, customizing, configuring,
deploying, installing, maintaining, analyzing, integrating,
repairing, and managing of cyber-security systems for
others; technical support services in the nature of
detecting and diagnosing computer hardware and software
security problems and vulnerabilities, updating and
maintenance of computer software relating to computer
security and to prevention and mitigation of computer risks;
cloud computing services featuring software and databases
for use in computer security and prevention and mitigation
of computer risks; computer security consultancy in the
field of malware, intrusion and penetration testing and
diagnosis of computers and networks to assess information
technology security and vulnerability; application service
provider (asp) featuring software for use for detection,
blocking, and facilitating removal and remediation of
viruses, worms, trojans, adware, spyware, rootkits,
backdoors, zero-day attacks, data exfiltration, phishing,
bots, time bombs, cyber-attacks, malicious attacks, advanced
persistent threats and other malware in computers, computer
systems, networks, hardware, software applications, digital
devices, and mobile digital devices; application service
provider (asp) featuring software that provides secure
virtual computer systems and virtual computing environments;
providing information in the field of information technology
security and vulnerability, including information related to
security and vulnerability of, and cyber-attacks and threats
against computers, computer systems, networks, hardware,
software applications, digital devices, digital data, and
mobile devices
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen