9
Computer systems, namely, computer hardware and software sold as a unit, for scanning, analyzing, characterizing and detecting viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer network; computer software; downloadable software; recorded software; Computer hardware and computer software platforms for network security, network analytics and business intelligence analytics; network detection and response software; Software in the field of cybersecurity that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds for security event detection and management, for security and privacy compliance and for risk analysis and reporting; Software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds; Software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds for security event detection and management, for security and privacy compliance and for risk analysis and reporting; Software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds and thereafter transfers the data to data lakes; Software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data into data lakes; Software that ingests, universalizes, and operationalizes data from different sources; Software for protecting and securing computer networks and applications; Software in the fields of computer security and prevention of computer risks; Software for analyzing privacy threats and detecting malware and other system vulnerabilities for computer networks; Software for providing computer intrusion detection and prevention; Software for providing network, Internet and computer security; Software for detecting viruses, worms, Trojan horses, adware, spyware, and other malware; Software for detecting identity fraud; Software for detecting malware and other threats to computer hardware and software; Software for use in detecting malware; Software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and computer networks
42
Software as a Service (SaaS); Providing Non-downloadable software; Software as a Service (SaaS) featuring software in the field of cybersecurity that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds for security event detection and management, for security and privacy compliance and for risk analysis and reporting; Software as a Service (SaaS) featuring software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds; Software as a Service (SaaS) featuring software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds for security event detection and management, for security and privacy compliance and for risk analysis and reporting; Software as a Service (SaaS) featuring software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data from multiple feeds and thereafter transfers the data to data lakes; Software as a Service (SaaS) featuring software that collects, ingests aggregates, compresses, standardizes, enriches, correlates and normalizes data into data lakes; Software as a Service (SaaS) featuring software that ingests, universalizes, and operationalizes data from different sources; Software as a Service (SaaS) featuring software for protecting and securing computer networks and applications; Software as a Service (SaaS) featuring software in the fields of computer security and prevention of computer risks; Software as a Service (SaaS) featuring software for analyzing privacy threats and detecting malware and other system vulnerabilities for computer networks; Software as a Service (SaaS) featuring software for providing electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing; Software as a Service (SaaS) featuring computer software for providing computer intrusion detection and prevention; Software as a Service (SaaS) featuring computer software for providing network, Internet and computer security; Software as a Service (SaaS) featuring computer software for detecting viruses, worms, Trojan horses, adware, spyware, and other malware; Software as a Service (SaaS) featuring computer software for detecting identity fraud; Software as a Service (SaaS) featuring computer software for detecting malware and other threats to computer hardware and software; Software as a Service (SaaS) featuring computer software for use in detecting malware; Software as a Service (SaaS) featuring software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and computer networks; Development of computer hardware and software platforms for network security, network analytics and business intelligence analytics; Providing on-line non-downloadable software platforms for network security, network analytics and business intelligence analytics; Providing network detection and response non-downloadable software