09
Downloadable and recorded computer software for providing
computer security; downloadable and recorded computer
software used to maintain security over or in computer
networks, web applications and/or digital data; downloadable
and recorded computer software for computer security risk
and threat analysis, assessment, management, remediation,
and elimination; downloadable and recorded computer
anti-virus software; downloadable and recorded computer
software for providing anti-virus scanning, detection,
identification, security, management, remediation, and
elimination of viruses, worms, trojans, spyware, adware,
malware and unauthorized data and programs on computer
systems, servers, and electronic devices; downloadable and
recorded computer software for computer security risk and
threat analysis, assessment, management, remediation, and
elimination for protecting computer hardware, systems,
servers, data, and electronic devices; downloadable and
recorded computer software in the nature of cybersecurity
software tools for assessing the vulnerability of computer
networks and for constant cybersecurity monitoring;
downloadable and recorded computer software for calculating
and simulating security breaches while providing suggestions
to protect cybersecurity; downloadable and recorded computer
software for collecting relevant configuration details
through agents continuously monitoring the entire fleet of
digital assets on a real-time basis; downloadable and
recorded computer software for integrating employees'
awareness, including employees' behavioral response
patterns; downloadable and recorded computer software for
providing real-time, on-demand comprehensive configuration
and vulnerability assessments; downloadable and recorded
computer software restricting unauthorized access to
computer systems as part of information security management;
downloadable and recorded computer software for
cybersecurity and computer security; downloadable and
recorded computer software for use in preventing
unauthorized access to and misuse of computer systems,
identifying and detecting viruses, worms, trojans, spyware,
adware, malware, and ransomware, authenticating domain-based
email messages, and identifying malicious websites;
downloadable and recorded computer security software,
namely, software for cybersecurity monitoring and control of
network activities on a computer; downloadable and recorded
computer security software for assessing and quantifying
digital security risks, threats, hacks, and data leakage
across networks for cybersecurity; downloadable and recorded
computer software, namely, software for data gathering,
storage, manipulation, management and encryption, and
management of security breach incidents and responses, for
use in the fields of security, forensic, diagnostic,
incident response, and education pertaining to information,
computer and internet security; downloadable and recorded
computer software for automated cybersecurity, digital
forensics, cyber threat intelligence, and incident response;
downloadable and recorded computer and information security
software; downloadable and recorded computer software for
managing security strategy and resources relating to the
security risk industry; downloadable and recorded computer
programs for managing security strategy and resources for
use in the security risk industry; downloadable and recorded
predictive computer and network vulnerability management
software; downloadable and recorded computer malware
incident forensics software; downloadable and recorded
cybersecurity incident response software; downloadable and
recorded computer software for assessing vulnerability,
preventing and addressing cybersecurity threats and attacks;
downloadable and recorded computer software for monitoring
of computer systems for detecting unauthorized access or
data breach; downloadable and recorded computer anti-virus
and anti-malware software; downloadable and recorded
internet security software; downloadable and recorded
computer software for detection and prevention of viruses
and malware; downloadable and recorded computer software for
computer, data and network security; downloadable and
recorded computer security software for automatically
identifying and sharing computer and network threat
intelligence across computer and network security layers;
downloadable and recorded computer software for
comprehensive network security, intrusion prevention, event
alerting, log capture, log analysis, network reporting,
backup and recovery of digital and electronic data, and
cybersecurity management
42
Software as a service (SaaS), namely, providing temporary
use of non-downloadable and recorded software for providing
computer security; software as a service (SaaS), namely,
providing temporary use of non-downloadable and recorded
software used to maintain security over or in computer
networks, web applications and/or digital data; software as
a service (SaaS), namely, providing temporary use of
non-downloadable and recorded software for computer security
risk and threat analysis, assessment, management,
remediation, and elimination; software as a service (SaaS),
namely, providing temporary use of non-downloadable and
recorded anti-virus software; application service provider
featuring software for providing anti-virus scanning,
detection, identification, security, management,
remediation, and elimination of viruses, worms, trojans,
spyware, adware, malware and unauthorized data and programs
on computer systems, servers and electronic devices;
providing temporary use of non-downloadable and recorded
software for computer security risk and threat analysis,
assessment, management, remediation, and elimination for
protecting computer hardware, systems, servers, data, and
electronic devices; software as a service (SaaS), namely,
providing temporary use of non-downloadable and recorded
cybersecurity software tools for assessing the vulnerability
of computer networks and for constant cybersecurity
monitoring; software as a service (SaaS) services featuring
software for calculating and simulating security breaches
while providing suggestions to protect cybersecurity;
software as a service (SaaS) services featuring software for
collecting relevant configuration details through agents
continuously monitoring the entire fleet of digital assets
on a real-time basis; software as a service (SaaS) services
featuring software for integrating employees' awareness,
including employees' behavioral response patterns; software
as a service (SaaS) services featuring software for
providing real-time, on-demand comprehensive configuration
and vulnerability assessments; software as a service (SaaS)
services featuring software restricting unauthorized access
to computer systems as part of information security
management; software as a service (SaaS) services featuring
software, configurations and controls for cybersecurity and
computer security; software as a service (SaaS) services,
featuring software, configurations and controls for use in
preventing unauthorized access to and misuse of computer
systems, identifying and detecting viruses, worms, trojans,
spyware, adware, malware, and ransomware, authenticating
domain-based email messages, and identifying malicious
websites; software as a service (SaaS) services featuring
software for cybersecurity monitoring and control of network
activities on a computer; software as a service (SaaS)
services featuring software for assessing and quantifying
digital security risks, threats, hacks, and data leakage
across networks for cybersecurity; computer services,
namely, providing forensic services to recover lost and
deleted data; computer services, namely, monitoring of
computer systems for detecting unauthorized access or data
breach; software as a service (SaaS) services featuring
software for automated cybersecurity, digital forensics,
cyber threat intelligence, and incident response; software
as a service (SaaS) services featuring computer and
information security software; software as a service (SaaS)
services featuring software for managing security strategy
and resources relating to the security risk industry;
software as a service (SaaS) services featuring software for
managing security strategy and resources for use in the
security risk industry; software as a service (SaaS)
services featuring predictive computer and network
vulnerability management software; software as a service
(SaaS) services featuring malware incident forensics
software; software as a service (SaaS) services featuring
cybersecurity incident response software; software as a
service (SaaS) services featuring software for assessing
vulnerability, preventing and addressing cybersecurity
threats and attacks; software as a service (SaaS) services
featuring computer and internet security software, computer
antivirus software, and anti-malware software; software as a
service (SaaS) services featuring software for computer,
data and network security; software as a service (SaaS)
services featuring computer security software for
automatically identifying and sharing computer and network
threat intelligence across computer and network security
layers; software as a service (SaaS) featuring software for
comprehensive network security, intrusion prevention, event
alerting, log capture, log analysis, network reporting,
backup and recovery of digital and electronic data, and
cybersecurity management