| Goods and Services | Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security consultancy; computer network security consultancy; computer security consultancy in the field of computer virus and malware scanning software; computer security services in the nature of analyzing, generating, validating and verifying the configuration of IT assets; computer security services in the nature of finding gaps and recommending mitigations and remediations for enterprise-wide risk, compliance, assurance, and security management; computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to hard drives, computer networks, digital assets, and websites; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring computer security software; software as a service (SAAS) services featuring computer software for analyzing information security for the purpose of configuration management; software as a service (SAAS) services featuring computer software for analyzing, repairing, and restoring information security for the purpose of configuration management and information security controls; software as a service (SAAS) services featuring computer software for modifying computer network security, computer network device, and information security configurations for the purpose of configuration management; software as a service (SAAS) services featuring computer software for detecting information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring computer software for repairing and restoring information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring computer software for automated repair and restoration of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and computer hackers; software as a service (SAAS) services featuring software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; software as a service (SAAS) services featuring software for use in collecting, , processing, and analyzing cybersecurity event data from computer systems, information security systems, computer applications, computer network devices, information security applications, and information security event data, namely, data from cybersecurity events; Software as a service (SAAS) services featuring software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems, and information security applications, all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, network security attacks, computer systems attacks, computer application attacks, computer network device attacks, information security application attacks and information security breaches; software as a service (SAAS) services featuring software for monitoring, analyzing, and reporting on information security event data, namely, data from cybersecurity events, from computers and computer networks for analysis and action by information security administrators or information security software; software as a service (SAAS) services featuring software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for transmission of information security configurations, logs and information security event data, namely, data from cybersecurity events; software as a service (SAAS) services featuring software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission, namely, transmission of data from cybersecurity events; providing online non-downloadable computer security software; providing online non-downloadable software for protecting businesses and customer data from malware and computer hackers; providing online non-downloadable software for Internet security, computer vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; providing online non-downloadable software for use in collecting, , processing, and analyzing cybersecurity event data from computer systems, computer applications, computer network devices, information security systems, and information security applications; providing online non-downloadable software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems, and information security applications, all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, computer system attacks, computer application attacks, computer network device attacks, information security system attacks, and information security breaches; providing online non-downloadable software for monitoring, analyzing, and reporting on cybersecurity event data from computers and computer networks for information security analysis and action by information security administrators or security software; providing online non-downloadable software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for transmission of information security logs and information security event data, namely, data from cybersecurity events; providing online non-downloadable software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer cybersecurity event transmission, namely, transmission of data from cybersecurity events; non-downloadable computer software for analyzing information security for the purpose of configuration management; non-downloadable computer software for analyzing, repairing, and restoring information security for the purpose of configuration management and information security controls; non-downloadable computer software for modifying computer network security, computer network device, and information security for the purpose of configuration management; non-downloadable computer software for detecting information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; non-downloadable computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; non-downloadable computer software for repairing and restoring information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; non-downloadable computer software for automated repairing and restoring information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities |
| Goods and Services | Downloadable computer security software; downloadable computer software for analyzing information security for purposes of configuration management; downloadable computer software for analyzing, restoring, and repairing information security for purposes of configuration management and information security controls; downloadable computer software for modifying computer network security, computer network device, and information security for purposes of configuration management; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for rigorous mathematical analysis of information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for restoring and repairing information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for automated repair and restoration of information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software that protects businesses and customer data from malware and computer hackers; downloadable computer software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; downloadable computer software for use in collecting, processing, and analyzing cybersecurity event data from computer systems, computer applications, computer network devices, and information security applications; downloadable computer software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems and information security applications, all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, network security attacks, computer systems attacks, computer application attacks, computer network device attacks, information security systems attacks, information security application attacks and information security breaches; downloadable computer software for monitoring, analyzing, and reporting on cybersecurity event data from computers and computer networks for analysis and action by information security administrators or information security software; downloadable computer software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for collection of information security configurations, logs and cybersecurity event data ; downloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission, namely, transmission of data from cybersecurity events |