09
Downloadable software and recorded software that functions
to prevent the exploitation of IoT enabled devices by
malicious actors; downloadable software and recorded
software that functions to prevent the exploitation of
embedded devices including routers, wireless access points
and similar equipment by malicious actors; downloadable
software and recorded software that functions to protect
executables and firmware images of an IoT enabled device
from vulnerability exploits; downloadable software and
recorded software that functions to protect executables and
firmware images of an embedded device including routers,
wireless access points and similar equipment from
vulnerability exploits; downloadable software and recorded
software for reporting and remediating compromised IoT
enabled devices; downloadable software and recorded software
for reporting and remediating compromised embedded devices
including routers, wireless access points and similar
equipment; downloadable software and recorded software that
functions to assess information security vulnerability (ies)
and exploits in operating IoT enabled devices and embedded
devices; downloadable software and recorded software,
namely, data protection software; downloadable software for
identifying, preventing and mitigating cyber security risks,
vulnerabilities, and exploits occurring in IoT enabled
devices and in embedded devices; downloadable and recorded
antihacking software
42
Providing on-line non-downloadable software that functions
to prevent the exploitation of IoT enabled devices including
by malicious actors; providing on-line non-downloadable
software that functions to prevent the exploitation of
embedded devices including routers, wireless access points
and similar equipment by malicious actors; providing on-line
non-downloadable software that functions to protect
executables and firmware images of an IoT enabled device
from vulnerability exploits; providing on-line
non-downloadable software that functions to protect
executables and firmware images of an embedded device
including routers, wireless access points and similar
equipment from vulnerability exploits; providing on-line
non-downloadable software for reporting and remediating
compromised IoT enabled devices; providing on-line
non-downloadable software for reporting and remediating
compromised embedded devices including routers, wireless
access points and similar equipment; providing on-line
non-downloadable software for analyzing reported software
vulnerability (ies) and exploitation; providing platform as
a service (PAAS) services, namely, providing web-based
computer software platform for assessing information
security vulnerability and exploitation data from operating
IoT enabled devices and embedded devices; providing on-line
non-downloadable data protection software; providing
platform as a service (PAAS) services, namely, providing
web-based computer software platform for protection from
exploitation by malicious actors; software as a service
(SAAS) services featuring software for preventing the
exploitation of IoT enabled devices by malicious actors;
software as a service (SAAS) services featuring software
that records exploitation of IoT enabled devices by
malicious actors; providing temporary use of
non-downloadable cloud-based software for identifying,
reporting, analyzing, or preventing the exploitation of IoT
enabled devices by malicious actors; providing temporary use
of non-downloadable software for identifying, preventing and
mitigating cyber security risks and vulnerabilities in IoT
enabled devices and embedded devices; providing temporary
use of non-downloadable antihacking software