9
Computer software for security, monitoring, troubleshooting and forensics for containers and microservices that may be downloaded from a global computer network; computer software platforms, downloadable, for security, monitoring, troubleshooting and forensics for containers and microservices; computer software platforms, recorded, for security, monitoring, troubleshooting and forensics for containers and microservices; downloadable software for monitoring and controlling communication between computers and automated machine systems; downloadable software for processing images, graphics and text; downloadable software for security, monitoring, troubleshooting and forensics for containers and microservices; downloadable cloud-based software for security, monitoring, troubleshooting and forensics for containers and microservices; downloadable computer software for administration of computer local area networks; downloadable computer software for administration of computer networks; downloadable computer software for application and database integration; downloadable computer software for authorizing access to data bases; downloadable computer software for database management; downloadable computer software for document management; downloadable computer software for encryption; downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; downloadable computer software for use in computer access control; downloadable computer software for use in database management; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for wireless content delivery; downloadable computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; downloadable computer software programs for spreadsheet management; downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; downloadable computer software to automate data warehousing; downloadable computer software to maintain and operate computer system; downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; downloadable computer operating software; downloadable industrial process control software; recorded computer software and hardware for security, monitoring, troubleshooting and forensics for containers and microservices sold as a unit; recorded computer software for database management; recorded computer software for use in database management; recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices and instructional user guides sold as a unit; recorded computer software for security, monitoring, troubleshooting and forensics for containers and microservices; recorded computer software platforms for security, monitoring, troubleshooting and forensics for containers and microservices; recorded database management software for security, monitoring, troubleshooting and forensics for containers and microservices; recorded computer software using artificial intelligence for security, namely, software that provides security capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments
42
Computer services, namely, integration of private and public cloud computing environments; consulting services in the field of software as a service (SaaS); consulting services in the design and implementation of computer-based information systems for businesses; consulting services in the field of cloud computing; design, development and implementation of software; providing virtual computer systems and virtual computer environments through cloud computing; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy in the field of security, monitoring, troubleshooting and forensics for cloud-based, container based, and host based application workloads and microservices; design, development, and implementation of security software for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; maintenance of computer software relating to computer security and prevention of computer risks; technical consulting in the field of artificial intelligence (AI) software customization; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; updating of computer software relating to computer security and prevention of computer risks; Software as a Service (SaaS) services featuring software for security, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; Software as a Service (SaaS) services featuring software for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; Software as a Service (SaaS) services featuring software using artificial intelligence for security, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; Software as a Service (SaaS) services, namely, hosting software for use by others for cloud-based, container based, and host based application workloads and microservices that may be downloaded from a global computer network, namely, security software that provides capabilities for host, container and cloud-based workloads and microservices to monitor, identify, troubleshoot, analyze and remediate events, incidents and attacks in customer IT environments; providing temporary use of on-line non-downloadable software using artificial intelligence (AI) within security software for responding to customer queries about the customer's IT environment; providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) within security software for responding to customer queries about the customer's IT environment
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen