CONCLUSIONS
Computer software and hardware, namely, software and hardware for centralized identification, acquisition, storage, encryption, management, manipulation, joining, analysis and reporting of computer data, computer network data, mobile device data, metadata, files, information and security breach incidents, as well as collection, analysis and monitoring of network traffic, for use in fields of cybersecurity, analytics, computer forensics, e-discovery and litigation; computer software and hardwa...
Abandoned · September 19, 2017 · 87614239 ·