09
Computer software used to maintain security over or in
computer networks, web applications and/or digital data;
computer software for providing network, Internet, and
computer security; computer software for emulating attack
methods used by computer hackers over communications
networks; computer software for computer security risk and
threat analysis, assessment, and management; computer
software for use in assessing deliverability of phishing
attacks and other malicious software and communications
attempting to obtain confidential information or deliver
malware or other unauthorized software, data or programs
through message gateways; computer software for emulating
attack methods used by threat actors, and measuring the
metrics and performance of software intended to prevent such
attack methods
42
Software as a service (SaaS), namely, providing temporary
use of non-downloadable software used to maintain security
over or in computer networks, web applications and/or
digital data; software as a service (SaaS), namely,
providing temporary use of non-downloadable software for
providing network, Internet, and computer security; software
as a service (SaaS), namely, providing temporary use of
non-downloadable software for emulating attack methods used
by computer hackers over communications networks; software
as a service (SaaS), namely, providing temporary use of
non-downloadable software for computer security risk and
threat analysis, assessment, and management; software as a
service (SaaS), namely, providing temporary use of
non-downloadable software for use in assessing
deliverability of phishing attacks and other malicious
software and communications attempting to obtain
confidential information or deliver malware or other
unauthorized software, data or programs through message
gateways; software as a service (SaaS), namely, providing
temporary use of non-downloadable software for emulating
attack methods used by threat actors, and measuring the
metrics and performance of software intended to prevent such
attack methods