Goods and Services | Providing non-downloadable software for providing security monitoring, identity authentication, security management, and security alerts and notifications for computer networks, and IT (information technology) infrastructures and cloud environments; Providing non-downloadable software for carrying out computer security service functions to verify user or machine identities, user or machine permissions, and for the management of user or machine data; Providing non-downloadable software for identity management and identity security; Providing non-downloadable software for enabling user authentication; Providing non-downloadable software for verifying and monitoring credentials; Providing non-downloadable software for identity verification and fraud detection and prevention; Providing non-downloadable software for pattern recognition for authentication, access control and security; Cybersecurity services in the nature of log analysis and log collection for monitoring and auditing computer networks, and IT (information technology) infrastructures and cloud environments; Providing non-downloadable software for use in the identification of and the investigation of potential threats and vulnerabilities in computer networks, and IT (information technology) infrastructures and cloud environments; Providing non-downloadable software for user identity and authentication, access management, sign-on control and intrusion prevention; Computer security services involving identification management, namely, cybersecurity management and maintenance of computer systems, and registry management and maintenance in the nature of identity databases stored in identity provider (IdP), software as a service (SaaS), infrastructure as a service (IaaS), and platform as a service (PaaS) systems on-premises or hosted in the cloud; Providing non-downloadable software for use in access control, monitoring access identity, and analyzing biometrics, credentials and other information relating to the identification of people or objects; Providing on-line non-downloadable software for risk reduction, breach detection, threat hunting, and breach response in the fields of cybersecurity; Computer security and data protection services, namely, tracking data from various sources and sending out alerts and notifications, namely, computer networks, and IT (information technology) infrastructures and cloud environments monitoring service which tracks threats and vulnerabilities and sends out reports and alerts; Providing non-downloadable software for providing suggestions and recommendations related to detected or potential computer networks, and IT (information technology) infrastructures and cloud environments threats and vulnerabilities; Providing non-downloadable software for reviewing data and running reports; Providing temporary use of non-downloadable software in the nature of an online dashboard for accessing, reviewing and identifying and categorizing security reports and alerts; Providing temporary use of non-downloadable software featuring an online dashboard for reviewing user activity logs and historical security data and running reports; Providing non-downloadable software for use as an application programming interface (API) for sharing data relevant to understanding the state of identity security posture and threat detection across identity provider (IdP), software as a service (SaaS), infrastructure as a service (IaaS), and platform as a service (PaaS) systems on-premises or hosted in the cloud; Computer services, namely, providing independent scoring related to cyber identity risk; Providing non-downloadable software for providing real-time and historical reports tracking user identity and authentication and access across all computer and online environments |