09
Computer hardware and software systems for security
operations center management, namely, hardware and software
for performing computer security, computer security policy
assessment, computer support, computer vulnerability
assessments, cybersecurity diagnostics, cybersecurity
maintenance, cybersecurity policy assessment, cybersecurity
support, cybersecurity vulnerability assessments, data
security diagnostics, data security maintenance, data
security, data security policy assessment, data security
support, data security vulnerability assessments, endpoint
detection and response, firewall security assessments,
firewall security diagnostics, firewall security
maintenance, firewall security, firewall security policy
assessment, firewall security support, firewall security
vulnerability assessments, hardware diagnostics, hardware
maintenance, hardware security, hardware security policy
assessment, hardware support, hardware vulnerability
assessments, information technology diagnostics, information
technology maintenance, information technology security,
information technology security policy assessment,
information technology support, information technology
vulnerability assessments, managed detection and response,
network diagnostics, network maintenance, network security,
network security policy assessment, network support, network
vulnerability assessments, password diagnostics, password
maintenance, password security, password security policy
assessment, password support, password vulnerability
assessments, security policy assessments, security
vulnerability assessments, penetration testing, security
operations center management, software diagnostics, software
maintenance, software security policy assessments, software
support, and software vulnerability assessments
42
Computer hardware diagnostic services; computer network
diagnostic services; computer network security policy
assessment, namely, assessing security threats and the
network's response; computer network security, namely,
analysis for protecting data, administering digital
credentials, enforcing network policies; computer network
support services, namely, installation, administration, and
troubleshooting of cybersecurity applications; computer
security consultancy in the nature of providing technical
recommendations and advice in the fields of internet
website, network, and computer data security; computer
security consultancy; computer security policy assessment,
namely, assessing security threats and the computer's
response; computer security, namely, cybersecurity protocol
assessment in the nature of analyzing threat response of
computers, networks, and devices; computer security, namely,
data security policy assessment in the nature of analyzing
threat response of computers, networks, and devices;
computer security, namely, firewall security policy
assessment in the nature of analyzing threat response of
firewalls; computer security, namely, hardware security
policy assessment in the nature of analyzing threat response
of computer hardware; computer security, namely, information
technology security policy assessment in the nature of
analyzing threat response of computers, networks, and
devices on information technology systems; computer
services, namely, endpoint detection and response of
software and hardware threats; computer services, namely,
managed detection and response of cyber intrusions and
threats; computer software and hardware password maintenance
services; computer software maintenance services; computer
support services, namely, troubleshooting of computer
software problems, monitoring technological functions of
computer network systems, monitoring vulnerability of
networks, monitoring intrusions in networks; computer
vulnerability assessments, namely, scanning and penetration
testing of computers and networks to assess information
security vulnerability; cybersecurity computer software
maintenance services; cybersecurity diagnostic services,
namely, computer security threat analysis for protecting
data and network access; cybersecurity support services,
namely, troubleshooting of computer software problems,
monitoring technological functions of computer network
systems, monitoring cybersecurity threats, preventing cyber
intrusions; cybersecurity, namely, enforcing, restricting
and controlling access privileges of users of computing
resources for cloud, mobile or network resources based on
assigned credentials, detecting threats and intrusions,
preventing intrusions; data security computer software
maintenance services; data security diagnostic services,
namely, computer security threat analysis for protecting
data, network security threat analysis for protecting data;
data security support services, namely, troubleshooting of
computer software problems, monitoring technological
functions of computer network systems, monitoring
cybersecurity threats, preventing cyber intrusions; data
security vulnerability assessments, namely, scanning and
penetration testing of computers and networks to assess
information security vulnerability; data security, namely,
computer security threat analysis for protecting data,
network security threat analysis for protecting data; design
and development of electronic data security systems;
development of customized software for others for use in
risk assessment and information security; firewall computer
software security maintenance services; firewall security
assessments, namely, scanning and penetration testing of
computers and networks to assess information security
vulnerability; firewall security diagnostic services,
namely, computer security threat analysis for protecting
data, network security threat analysis for protecting data;
firewall security support services, namely, troubleshooting
of computer software problems, monitoring technological
functions of computer network systems, monitoring
cybersecurity threats, preventing cyber intrusions; firewall
security vulnerability assessments, namely, scanning and
penetration testing of computers and networks to assess
information security vulnerability; firewall security,
namely, security threat analysis for protecting data;
technical support services, namely, troubleshooting of
computer software problems, monitoring technological
functions of computer network systems, monitoring
cybersecurity threats, preventing cyber intrusions; hardware
vulnerability assessments, namely, scanning and penetration
testing of computers and networks to assess information
security vulnerability; information technology diagnostic
services, namely, computer security threat analysis for
protecting data; information technology maintenance
services, namely, computer software maintenance services;
information technology security, namely, security threat
analysis for protecting data; information technology support
services, namely, troubleshooting of computer software
problems, monitoring technological functions of computer
network systems, monitoring cybersecurity threats,
preventing cyber intrusions; information technology
vulnerability assessments, namely, scanning and penetration
testing of computers and networks to assess information
security vulnerability; maintenance of computer software
relating to computer security and prevention of computer
risks; managed security service provider, namely, hosting,
managing, developing, analyzing, and maintaining
applications, software, and web sites, of others in the
fields of cybersecurity; network vulnerability assessments,
namely, scanning and penetration testing of computers and
networks to assess information security vulnerability;
password diagnostic services; password security, namely,
providing authentication, issuance, validation and
revocation of digital credentials; password support
services, namely, providing help desk services to retrieve
computer software and hardware passwords; password
vulnerability assessments, namely, scanning and penetration
testing of computers and networks to assess information
security vulnerability; penetration testing for computer
security threats for computer hardware and software;
providing online non-downloadable computer software for
protecting and securing computer networks and applications;
providing online non-downloadable computer software for
providing real-time information security intelligence in the
fields of computer, data, internet website, and network
security; providing online non-downloadable computer
software for providing real-time security audits of an
online application, network, and host; providing online
non-downloadable software for analyzing and preventing cyber
threats in the fields of computer security; providing
temporary use of non- downloadable software for security
operations center management; security policy assessment,
namely, data security consultancy; software diagnostic
services, namely, computer security threat analysis for
protecting data; software security policy assessments,
namely, computer security threat analysis for protecting
data; software support services, namely, troubleshooting of
computer software problems, troubleshooting of computer
hardware and software security problems; technical support
services, namely, troubleshooting of computer software
security problems; testing of computer software and hardware
security systems; vulnerability assessments, namely,
scanning and penetration testing of computers and networks
to assess information security vulnerability
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen