09
Downloadable computer software for enabling and managing
secure communications and connections to resources on a
computer network; downloadable computer software for
information technology, credential, data, and password
management, database access management, and operating system
access management; downloadable computer software for remote
access management for computer systems and networks;
downloadable computer software for enabling secure
connections to a compute resource on a network through the
use of a privileged access service authentication service,
privilege elevation service, audit and monitoring service,
and/or privilege threat analytics service, providing
seamless and context-based multi-factor authentication layer
of security in the nature of requiring users to provide the
combination of username, passwords, PIN, security questions,
one-time passcodes, smart card, or biometrics for protecting
and securing enterprise assets; downloadable computer
software for enabling directory services-based integrated
solutions that deliver authentication, single sign-on,
remote access, file-sharing, and reporting capabilities for
cross-platform systems deployed on-premise or in the cloud
providing a cloud-based service to access and secure
privileged accounts; downloadable computer software for
enabling the discovery of systems within a network, checks
their ability to integrate with directory services software,
downloads required software packages and automatically
deploy the packages to the discovered systems and enables
secure remote access to these systems using directory
services credentials; downloadable computer software for
enabling directory services-based auditing, access control
and identity management solutions that secure cross-platform
environments and help with regulatory compliance;
downloadable computer software for enabling the management
of identity policies for different operating systems
42
Software as a service (SAAS) services featuring computer
software for enabling and managing secure communications and
connections to resources on a computer network; software as
a service (SAAS) services featuring computer software for
information technology, credential, data, and password
management, database access management, and operating system
access management; software as a service (SAAS) services
featuring computer software for remote access management for
computer systems and networks; software as a service (SAAS)
services featuring computer software for enabling secure
connections to a compute resource on a network through the
use of a privileged access service authentication service,
privilege elevation service, audit and monitoring service,
and/or privilege threat analytics service, providing
seamless and context-based multi-factor authentication layer
of security in the nature of requiring users to provide the
combination of username, passwords, PIN, security questions,
one-time passcodes, smart card, or biometrics for protecting
and securing enterprise assets; software as a service (SAAS)
services featuring computer software for enabling directory
services-based integrated solutions that deliver
authentication, single sign-on, remote access, file-sharing,
and reporting capabilities for cross-platform systems
deployed on-premise or in the cloud providing a cloud-based
service to access and secure privileged accounts; software
as a service (SAAS) services featuring computer software for
enabling the discovery of systems within a network, checks
their ability to integrate with directory services software,
downloads required software packages and automatically
deploy the packages to the discovered systems and enables
secure remote access to these systems using directory
services credentials; software as a service (SAAS) services
featuring computer software for enabling directory
services-based auditing, access control and identity
management solutions that secure cross-platform environments
and help with regulatory compliance; software as a service
(SAAS) services featuring computer software for enabling the
management of identity policies for different operating
systems