09
Computer software and downloadable computer software for
Information Technology (IT) asset management, namely,
cataloging and managing of IT physical and logical business
assets and cloud resources; computer software and
downloadable computer software for IT risk management,
namely, assessing and managing IT risks in context of the
business, and presenting risk exposure thereto; computer
software and downloadable computer software for IT
vulnerability management, namely, detecting and remediating
vulnerabilities and related threats across physical and
logical IT assets through integration into a security tools
architecture; computer software and downloadable computer
software for IT control management, namely, documenting,
assessing, and providing an evidence trail of IT controls
and compliance with standards and regulations; all in the
fields of information assurance, information security,
cybersecurity, operational security, computer network data
analytics, secure wireless networking and secure mobility,
identity management, secure message handling, secure LAN
data integration, and organizational enterprise risk
management relating to network security, communication
security and data security
42
Providing temporary use of non-downloadable software for
Information Technology (IT) asset management, namely,
cataloging and managing of IT physical and logical business
assets and cloud resources; providing temporary use of
non-downloadable software for IT risk management, namely,
assessing and managing IT risks in context of the business,
and presenting risk exposure thereto; providing temporary
use of non-downloadable software for IT vulnerability
management, namely, detecting and remediating
vulnerabilities and related threats across physical and
logical IT assets through integration into a security tools
architecture; providing temporary use of non-downloadable
software for IT control management, namely, documenting,
assessing, and providing an evidence trail of IT controls
and compliance with standards and regulations; all in the
fields of information assurance, information security,
cybersecurity, operational security, computer network data
analytics, secure wireless networking and secure mobility,
identity management, secure message handling, secure LAN
data integration, and organizational enterprise risk
management relating to network security, communication
security and data security; software as a service (SAAS)
services featuring software for Information Technology (IT)
asset management, namely, cataloging and managing of IT
physical and logical business assets; software as a service
(SAAS) services featuring software for IT risk management,
namely, assessing and managing IT risks in context of the
business, and presenting risk exposure thereto; software as
a service (SAAS) services featuring software for IT
vulnerability management, namely, detecting and remediating
vulnerabilities and related threats across physical and
logical IT assets through integration into a security tools
architecture; software as a service (SAAS) services
featuring software for IT control management, namely,
documenting, assessing, and providing an evidence trail of
IT controls and compliance with standards and regulations;
all in the fields of information assurance, information
security, cybersecurity, operational security, computer
network data analytics, secure wireless networking and
secure mobility, identity management, secure message
handling, secure LAN data integration, and organizational
enterprise risk management relating to network security,
communication security and data security
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen