Goods and Services | Downloadable computer software, namely, downloadable computer software for computer and computer network security, adaptive risk-based decision making and computer security risk mitigation, computer software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information, computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and policies, computer software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity, computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, generating security reports, providing security alerts, and for security compliance; downloadable computer software, namely, downloadable computer software for identity and access management, privilege and permissions access management, cloud infrastructure entitlements management, cloud security, protection of cloud-based information, database management, data security, risk assessment and monitoring of cloud systems, detection and remediation of machine and user privileges, detection and prevention of unauthorized user access and computer data breaches, computer software for monitoring of cloud systems for anomalous activity, vulnerabilities, misconfigurations, and compliance violations, computer software for identity authentication, security management and cloud security auditing, computer software for digital threat information management, cloud platform security management, user account protection and prevention of unauthorized access to web applications and cloud applications, and downloadable computer software for enforcing, restricting and controlling access privileges of machines and users of computing resources for cloud, mobile and network resources based on assigned credentials |
Goods and Services | Scientific services, namely, scientific research in the field of cloud security, computer security, computer software, information technology systems, identity and access management in the cloud, privilege and permissions access management, cloud infrastructure entitlements management, and product research and design related thereto; design, maintenance, development, and updating of computer security software; providing a website featuring information in the field of cloud security, computer security, cloud computing, computer software, information technology systems, identity and access management in the cloud, privilege and permissions access management, database management, computer and cloud security risk assessment, and cloud infrastructure entitlements management; data, cloud, and computer security consultancy; computer security threat analysis for protecting data; providing temporary use of online non-downloadable computer software and software as a service (SaaS) services, namely, non-downloadable computer software for computer and computer network security, adaptive risk-based decision making and computer security risk mitigation, computer software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information, computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and policies, computer software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity, computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, generating security reports, providing security alerts, and for security compliance; providing temporary use of online non-downloadable computer software and software as a service (SaaS) services, namely, non-downloadable computer software for identity and access management, privilege and permissions access management, cloud infrastructure entitlements management, cloud security, protection of cloud-based information, database management, data security, risk assessment and monitoring of cloud systems, detection and remediation of machine and user privileges, detection and prevention of unauthorized user access and computer data breaches, monitoring of cloud systems for anomalous activity, vulnerabilities, misconfigurations, and compliance violations, identity authentication, security management and cloud security auditing, digital threat information management, cloud platform security management, user account protection and prevention of unauthorized access to web applications and cloud applications, and non-downloadable software for enforcing, restricting and controlling access privileges of machines and users of computing resources for cloud, mobile and network resources based on assigned credentials; technical support services, namely, troubleshooting of computer software and cloud security problems; consulting services in the field of software as a service (SAAS), cloud computer software, access management risk, and computer security software; consulting, advisory, and information services relating to the aforesaid services |