42
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and analysis of patterns
for identifying cyber threats to network and cloud security;
providing non-downloadable cloud computing software using
artificial intelligence for telemetry monitoring, and threat
detection, intelligence, and response; providing
non-downloadable software and applications for
troubleshooting, diagnosing, and protecting computer
software, hardware, networks, virtual machines, and
operational technology; providing non-downloadable software
and applications for autonomous management of security
operations and incident response; providing non-downloadable
software for data mining, connecting with internet protocol
addresses, identifying internet protocol addresses, securing
network operations, and identifying network security risks;
providing non-downloadable software for use in monitoring of
computer systems all to, namely, allow users to aggregate,
model, and analyze data from their machines and
infrastructure for security purposes; software as a service
(SAAS) featuring software using cloud-based technology and
artificial intelligence for network security, end point
security and cloud security; software as a service (saas)
services featuring software for providing descriptive
analytics, diagnostic analytics, predictive analytics,
prescriptive analytics and analytics against data, namely,
computer systems analysis, computer systems security
analysis, computer network security analysis, computer
network management and optimization, information technology
management and optimization; software as a service (saas)
services featuring software for use in data science, asset
optimization, and optimization of infrastructure management
and/or information security processes for information
technology security, governance, and compliance, namely,
testing, analysis, identification, evaluation and reporting
on computer assets and systems on the internet or in the
cloud of others to facilitate identification, remediation,
and management of security vulnerabilities; monitoring of
computer systems for security purposes in the nature of
cybersecurity, unauthorized access, data breach, and
detection; monitoring data, namely, monitoring of computer
systems for detecting data associated with the
configuration, operation, and behavior of networked
computing systems; computer security and information
technology consultancy in the field of data collection,
attack surface and vulnerability enumeration and
remediation, and penetration testing of computers and
networks to assess information security vulnerability and IT
operations; data automation and collection service using
proprietary software to evaluate, analyze and collect
service data
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen