9
Computer software; computer software for use in the field of cybersecurity; computer software for detecting, analyzing, reporting on, and protecting computer networks and systems from cyber-attacks, including malware; computer software for the collection and submission of cyber-attack data and malware for analysis and mitigation
42
Software as a services (saas) services; software as a service (saas) services featuring software for detecting, analyzing, reporting on, and protecting computer networks and systems from cyber-attacks, including malware; software as a service (saas) services featuring software for visualizing cyber-attacks and providing data on cyber-attacks; software as a service (saas) services featuring software for tracking, collecting, and analyzing the activities of users of computer networks and systems and for detecting malicious activities on computer networks and systems; software as a service (saas) services featuring software for detecting and analyzing the infrastructure of computer networks and systems, including identifying devices that are not under management; software as a service (saas) services featuring software for evaluating the performance of security measures used to protect computer networks and systems; software as a service (saas) services featuring software for performing security audits of computer networks and systems; information technology consulting services; business technology software consultation services; computer security consultancy; monitoring of computer systems for security purposes; providing a web site featuring information in the field of computer security; consulting services in the field of maintaining the security and integrity of databases; cybersecurity services; technological research, analysis, web-based intelligence services and reports, web-based reporting tools, and portals relating to cyber-threats; research in the field of intelligence and security technology; computer consultancy services, namely, technical analysis of cyber-threats, delivery of threat data, and generating and delivery of threat reports; engineering, computer technology, cybersecurity and computer technology consulting services; computer services, namely, monitoring and reporting on cyber-threats for others; providing an internet website portal featuring information in the field of cybersecurity; computer security consultancy in the field of cybersecurity, namely, collecting and aggregating data and intelligence