09
Downloadable computer software, namely, downloadable
computer software for computer and computer network
security, adaptive risk-based decision making and computer
security risk mitigation, computer software for the
collection, editing, organizing, modifying, transmission,
processing, storage, analysis, and sharing of data and
information, computer security software for the creation,
monitoring, and enforcement of security protocols,
credentials, and policies, computer software for auditing
and monitoring computer systems, computer system resources,
machine activity, and user activity, computer software for
detecting, analyzing, monitoring, displaying, and countering
computer security threats, generating security reports,
providing security alerts, and for security compliance;
downloadable computer software, namely, downloadable
computer software for identity and access management,
privilege and permissions access management, cloud
infrastructure entitlements management, cloud security,
protection of cloud-based information, database management,
data security, risk assessment and monitoring of cloud
systems, detection and remediation of machine and user
privileges, detection and prevention of unauthorized user
access and computer data breaches, computer software for
monitoring of cloud systems for anomalous activity,
vulnerabilities, misconfigurations, and compliance
violations, computer software for identity authentication,
security management and cloud security auditing, computer
software for digital threat information management, cloud
platform security management, user account protection and
prevention of unauthorized access to web applications and
cloud applications, and downloadable computer software for
enforcing, restricting and controlling access privileges of
machines and users of computing resources for cloud, mobile
and network resources based on assigned credentials
42
Scientific services, namely, scientific research in the
field of cloud security, computer security, computer
software, information technology systems, identity and
access management in the cloud, privilege and permissions
access management, cloud infrastructure entitlements
management, and product research and design related thereto;
design, maintenance, development, and updating of computer
security software; providing information on computer and
cloud technology in the field of cloud security, computer
security, cloud computing, computer software, information
technology systems, identity and access management in the
cloud, privilege and permissions access management, database
management, computer and cloud security risk assessment, and
cloud infrastructure entitlements management via a website;
data, cloud, and computer security consultancy; computer
security threat analysis for protecting data; providing
temporary use of online non-downloadable computer software
and software as a service (SaaS) services, namely,
non-downloadable computer software for computer and computer
network security, adaptive risk-based decision making and
computer security risk mitigation, computer software for the
collection, editing, organizing, modifying, transmission,
processing, storage, analysis, and sharing of data and
information, computer security software for the creation,
monitoring, and enforcement of security protocols,
credentials, and policies, computer software for auditing
and monitoring computer systems, computer system resources,
machine activity, and user activity, computer software for
detecting, analyzing, monitoring, displaying, and countering
computer security threats, generating security reports,
providing security alerts, and for security compliance;
providing temporary use of online non-downloadable computer
software and software as a service (SaaS) services, namely,
non-downloadable computer software for identity and access
management, privilege and permissions access management,
cloud infrastructure entitlements management, cloud
security, protection of cloud-based information, database
management, data security, risk assessment and monitoring of
cloud systems, detection and remediation of machine and user
privileges, detection and prevention of unauthorized user
access and computer data breaches, monitoring of cloud
systems for anomalous activity, vulnerabilities,
misconfigurations, and compliance violations, identity
authentication, security management and cloud security
auditing, digital threat information management, cloud
platform security management, user account protection and
prevention of unauthorized access to web applications and
cloud applications, and non-downloadable software for
enforcing, restricting and controlling access privileges of
machines and users of computing resources for cloud, mobile
and network resources based on assigned credentials;
technical support services, namely, troubleshooting of
computer software and cloud security problems; consulting
services in the field of software as a service (SaaS), cloud
computer software, access management risk, and computer
security software; consulting, advisory, and information
services relating to the aforesaid services
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen