Goods and Services | software as a service (saas) services featuring software for the automation of security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; IT services, namely, IT consultancy services; software as a service (saas) services featuring software for automating it security, protection and restoration services in the nature of securing virtual and physical infrastructure and security operations activities, including incident response investigation, and analysis, threat and vulnerability management, event workflow and response, mitigation and remediation orchestration, and security intelligence reporting; data security consultancy; providing temporary use of on-line non-downloadable enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer network security consultation in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network; monitoring of computer systems operation by remote access for security purposes, namely, integrating vulnerability testing, vulnerability prioritization and remediation, managing testing and scanning tools, providing application risk visibility to detect breakdowns and unauthorized access or data breach, and to ensure proper functioning; consultancy in the field of security software |