9
Downloadable computer software featuring software: for managing access control settings for Information Technology infrastructure, for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, for auditing and monitoring computer systems, computer system resources, human and non-human user activity, for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, for implementing least privilege access across computer networks network and cloud environments, for utilizing Artificial- Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, for integrating with privileged access management solutions and for securing computer networks and cloud resources; and downloadable electronic computer manuals distributed with the foregoing goods
42
Software as a service (SAAS) services featuring software: for managing access control settings for Information Technology infrastructure, for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, for auditing and monitoring computer systems, computer system resources, human and non-human user activity, for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, for implementing least privilege access across computer networks network and cloud environments, for utilizing Artificial- Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, for integrating with privileged access management solutions and for securing computer networks and cloud resources; and consulting, advisory, and information services relating to products and services in the foregoing fields