Goods and Services | Network penetration testing, namely, simulating real-world network attack to find and exploit security vulnerabilities within an internal and external network environment; application penetration testing, namely, simulating real-world attack on applications to find and exploit security vulnerabilities within the web applications, mobile applications, and API's; vulnerability classification, namely, classifying technical and compliance vulnerabilities based on scoring systems to understand the exposure of an organization; cloud penetration testing, namely, simulating real-world attack on a cloud environment to find and exploit security vulnerabilities within the internal and external cloud footprint; continuous penetration testing, namely, providing organizations with a consistent feed of new and emerging attack simulations throughout a period of time to provide to consistently find new threats associated with the clients technology environment; Providing software as a service (SaaS) services featuring software for cybersecurity monitoring and control of activities on a computer, antivirus scanning, computer virus characterization, remediation, and elimination, simulating large-scale processes in the field of enterprise cybersecurity, providing large-scale graph-based database services used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, providing malware incident forensics services, providing malware incident remediation services, providing rules-based decision support services in the field of enterprise cybersecurity, providing neural networks for use in analytics and planning in the field of enterprise cybersecurity, providing temporal event capture, analysis, and management services in the field of enterprise cybersecurity, providing risk quantification, mitigation, and management services in the field of enterprise cybersecurity, providing cyber decision platform services in the field of enterprise cybersecurity; providing services for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents, and providing business analytics functionality for the purpose of data-driven decision making and predictive analytics in the field of enterprise cybersecurity; providing professional consulting services pertaining to the deployment, configuration and optimization of software delivered from the cloud or deployed locally, namely, software for cybersecurity monitoring and control of activities on a computer, antivirus software, simulation software used in the field of enterprise cybersecurity, graph-based database software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, kernel-level software for preventing actions by malware, malware incident forensics software, malware incident remediation software, rules-based decision support software used in the field of enterprise cybersecurity, neural network software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, temporal event capture, management, and analysis software used in the field of enterprise cybersecurity, risk quantification, mitigation, and management software, cyber decision platform software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, software for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents in the field of enterprise cybersecurity, and business analytics software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity |