09
Software to allow users to perform electronic business
transactions via a global computer network; software for use
in access control and identity management in business to
business, business to enterprise and business to consumer
applications, and for providing authentication, issuance,
and validation of devices, digital identities and digital
certificates for web-based software applications for
computers and mobile computing devices; software to assess,
test and exploit vulnerabilities in devices, applications,
systems and networks; software for providing identity and
information security solutions for cloud, mobile, web and
vpn systems; software for providing identity-based security
automation solutions; software for providing identity and
access management solutions; software for providing
multi-factor authentication and modern adaptive
authentication solutions; software for providing network
security and penetration testing services; software for
exploiting and conducting post-exploitation efforts of
vulnerabilities discovered in a target computer network;
software for the automation of repeatable penetration test
exploit techniques; software for conducting penetration
tests for computer terminals, services, networks and end
points for determining and identifying information security
exploits; software for identifying vulnerability trends and
tracking vulnerabilities identified by manual testing and
other assurance activities such as penetration tests, code
reviews, and threat modeling; software for providing single
sign-on solutions; software for enforcing, restricting and
controlling access privileges of users of computing
resources for cloud, mobile, or network resources based on
assigned credentials; software for providing user
authentication services using single sign-on technology for
online software applications; software for providing user
authentication services using biometric hardware, behavioral
biometrics and software technology for e-commerce
transactions and identity and access management; software
for restricting unauthorized / access to hard drives,
computer networks, websites; software for restricting
unauthorized / system and network access by validating
credentials; software for providing authentication,
issuance, validation and revocation of digital certificate;
software for use to access, collect and modify network user
identification; software for workflow, helpdesk and network
security management; software for use to automate password
management allowing users to securely reset and synchronize
passwords across multiple applications, the internet, and
local, wide area and other global computer networks;
software for automating and managing security policy
administration, enforcement, and compliance for users of
software applications; software to receive, aggregate,
define, store, model, manage, send, and present information
on relationships between people and their access rights to
processes, projects, data, locations, and business resources
in an organization; software which provides analysis of data
being accessed within a network; computer security software,
namely, software for encrypting and protecting the integrity
of data and electronic communications over computer
networks; computer software for authentication, access
control and other security features within computer networks
and through external connections; computer software for
implementing security methodology involving encryption of
payment card numbers over a global computer network;
computer software for use to compile, manage, encrypt and
store personal information; computer software for use to
access, collect and modify network user identification;
computer software for workflow, helpdesk and network
security management; computer software for use to automate
password management allowing users to securely reset and
synchronize passwords across multiple applications, the
internet, and local, wide area and other global computer
networks; computer software to enable users of other
computer products to connect to and use customer help and
support functions across multiple applications, the
internet, and local, wide area and other global computer
networks; computer software, namely, identification
management software for defining, managing, establishing and
assigning sets of users' access rights to applications,
data, and networks; computer software for registering and
authenticating digital certificates; computer software for
accessing, creating and modifying network user
identification information; and computer software which
enables users of other computer products to access and use
customer help and customer support functions
42
Computer security services, namely, restricting access to
and by computer networks and resources; software as a
services (SAAS) services featuring software to test and
exploit vulnerabilities in systems and networks, for
identity-based security automation solutions, for use in
access control and identity management, and for providing
authentication, issuance, and validation of devices, digital
identities and digital certificates; computer security
services, namely, services for testing and exploiting
vulnerabilities in systems and networks; providing identity
and information security solutions for cloud, mobile, web
and VPN systems in the nature of electronic signature
verification and logon services using technology to
authenticate user identity, user access request management,
automation of the creation and management of user accounts
and access rights, and role-based access control programs;
providing identity-based security automation solution
services, namely, electronic monitoring of personally
identifying information to detect identity theft via the
internet; providing identity and access management solution
services, namely, providing user authentication services
using biometric hardware and software technology for
e-commerce transactions; providing multi-factor
authentication and modern adaptive authentication solution
services, namely, providing user authentication services
using single sign-on technology for online software
applications; providing network security and penetration
testing services to assess information security
vulnerability; providing user authentication services using
single sign-on technology for online software applications;
software as a services (SAAS) services featuring software
for providing identity and information security solutions
for cloud, mobile, web and VPN systems, identity-based
security automation, identity and access management,
multi-factor authentication and modern adaptive
authentication, and network security and penetration testing
services; software as a services (SAAS) services featuring
software for enforcing, restricting and controlling access
privileges of users of computing resources for cloud,
mobile, or network resources based on assigned credentials;
computer security services, namely, enforcing, restricting
and controlling access privileges of users of computing
resources for cloud, mobile, or network resources based on
assigned credentials; software as a service (SAAS) services
featuring software for use in access control and identity
management in business to business, business to enterprise
and business to consumer applications, and for enforcing,
restricting and controlling access privileges of users of
computing resources for cloud, mobile, or network resources
based on assigned credentials; platform as a service (PAAS)
services featuring computer software platforms for use in
access control and identity management in business to
business, business to enterprise and business to consumer
applications, and for enforcing, restricting and controlling
access privileges of users of computing resources for cloud,
mobile, or network resources based on assigned credentials;
application service provider (ASP) featuring software for
use in access control and identity management in business to
business, business to enterprise and business to consumer
applications, and for enforcing, restricting and controlling
access privileges of users of computing resources for cloud,
mobile, or network resources based on assigned credentials;
computer security services in the nature of access privilege
enforcement services, namely, validating the identity and
access privileges of users or personnel prior to accessing
computers, computer networks, or other computer resources;
providing user authentication services in e-commerce
transactions; providing authentication, issuance, and
validation of devices, digital identity and digital
certificates for web-based software applications for
computers and mobile computing devices; providing
authentication, issuance, and validation of digital identity
certificates for web-connected network systems, resources,
and controls; providing authentication, issuance, and
validation of digital identity certificates for networked
security processes such as passwords, user management, and
help desk management utilities; providing authentication,
issuance, and validation of digital identity certificates
for web-connected network system users; computer security
services in the nature of providing authentication,
issuance, validation and revocation of digital certificates;
identification verification services, namely, electronic
document and e-mail authentication services sign-on and
login authentication services; identification verification
services, namely, providing authentication of personal
identification information in the nature of validation of
digital certificates from secure storage and transmitting
such information via the internet; computer security
services, namely for authentication, issuance and validation
of digital certificates; computer security services namely
for threat analysis for protecting data; software as a
service (SAAS) services featuring software for use in access
control and identity management in business to business,
business to enterprise and business to consumer
applications, and for providing authentication, issuance,
and validation of digital identity certificates for
web-based software applications for computers and mobile
computing devices; platform as a service (PAAS) services
featuring computer software platforms for use in access
control and identity management in business to business,
business to enterprise and business to consumer
applications, and for providing authentication, issuance,
and validation of digital identity certificates for
web-based software applications for computers and mobile
computing devices; application service provider (ASP)
services featuring software for use in access control and
identity management in business to business, business to
enterprise and business to consumer applications, and for
providing authentication, issuance, and validation of
digital identity certificates for web-based software
applications for computers and mobile computing devices;
computer security services in the nature of providing
authentication, issuance, validation and revocation of
digital certificates; providing user authentication services
using single sign-on technology for online software
applications; providing user authentication services using
behavioral biometrics, biometric hardware and software
technology for e-commerce transactions and identity and
access management; computer security services in the nature
of administering digital keys; computer security services,
namely, restricting unauthorized / access to hard drives,
computer networks, websites; data encryption services;
computer security services, namely, restricting unauthorized
/ network access by validating credentials; computer
consultation services involving the creation and development
of computer security software programs for others and
security printing, namely, encoding identification
information, non-valuable documents and products; software
as a service (SAAS) services featuring software for use in
workflow, helpdesk and network security management; software
as a service (SAAS) services featuring software for use to
automate password management allowing users to securely
reset and synchronize passwords across multiple
applications, the internet, and local, wide area and other
global computer networks; software as a service (SAAS)
services featuring software to receive, aggregate, define,
store, model, manage, send, and present information on
relationships between people and their access rights to
processes, projects, data, locations, and business resources
in an organization; and software as a service (SAAS)
services featuring software which provides analysis of data
being accessed within a network; software as a service
(SAAS) services, namely, hosting software for use by others
for use to compile, manage, encrypt and store personal
information; providing temporary use of online
non-downloadable computer software for use to access,
collect and modify network user identification; providing
temporary use of online non-downloadable computer software
for workflow, helpdesk and network security management;
providing temporary use of online non-downloadable computer
software for use to automate password management allowing
users to securely reset and synchronize passwords across
multiple applications, the internet, and local, wide area
and other global computer networks; providing technology to
enable users of other computer products to connect to and
use customer help and support functions across multiple
applications, the internet, and local, wide area and other
global computer networks via a website; providing temporary
use of online non-downloadable computer software for
automating and managing security policy administration,
enforcement, and compliance for users of software
applications; providing temporary use of online
non-downloadable computer software, namely, identification
management software for defining, managing, establishing and
assigning sets of users' access rights to applications,
data, and networks; providing temporary use of online
non-downloadable computer software to receive, aggregate,
define, store, model, manage, send, and present information
on relationships between people and their access rights to
processes, projects, data, locations, and business resources
in an organization; providing temporary use of online
non-downloadable computer software for registering and
authenticating digital certificates; providing temporary use
of online non-downloadable computer software for accessing,
creating and modifying network user identification
information; providing temporary use of online
non-downloadable computer software for workflow management,
help desk management, and network security; providing
temporary use of online non-downloadable computer software
which provides analysis of data being accessed within a
network; providing software as a service (SAAS) services
featuring software for the update, installation and
maintenance of computer security software; providing online
non-downloadable cloud-based security software for threat
analysis for protecting data; computer security consultancy
in the field of scanning and penetration testing of
computers and networks to assess information security
vulnerability; monitoring and testing of computer terminals,
servers, networks and end points directed toward the
detection or other action with respect to security exploits
and information security vulnerability; and computer network
security services and communications network security
services in the nature of restricting unauthorized network
access by network intrusion protection, computer testing for
vulnerability management and assessment, managing endpoint
security on networks, data breach threat analysis,
vulnerability analysis, network threat analysis, computer
incident response, network incident response, and forensics
and penetration testing
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen