Goods and Services | Providing non-downloadable software for providing security monitoring, identity authentication, security management, and security alerts and notifications for computer networks, and IT (information technology) infrastructures and cloud environments; Providing non-downloadable software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; Providing non-downloadable software for identity management and identity security; Providing non-downloadable software for providing user authentication services; Providing non-downloadable software for verifying and monitoring credentials; Providing non-downloadable software for identity verification and fraud detection and prevention; Providing non-downloadable software for pattern recognition for authentication, access control and security; Cybersecurity services in the nature of log analysis and log collection for monitoring and auditing computer networks, and IT (information technology) infrastructures and cloud environments; Providing non-downloadable software for use in the identification of and the investigation of potential threats and vulnerabilities in computer networks, and IT (information technology) infrastructures and cloud environments; Providing non-downloadable software for user identity and authentication, access management, sign-on control and intrusion prevention; Computer services, namely, identification management services, namely, management and maintenance, and registry management and maintenance; Providing non-downloadable software for use in access control, access identity, biometrics, credentials and other information relating to the identification of people or objects; Providing on-line non-downloadable software for risk reduction, breach detection, threat hunting, and breach response in the fields of cybersecurity; Computer services, namely, tracking data from various sources and sending out alerts and notifications, namely, computer networks, and IT (information technology) infrastructures and cloud environments monitoring service which tracks threats and vulnerabilities and sends out reports and alerts; Providing non-downloadable software for providing suggestions and recommendations related to detected or potential computer networks, and IT (information technology) infrastructures and cloud environments threats and vulnerabilities; Providing non-downloadable software for reviewing data and running reports; Providing temporary use of non-downloadable software in the nature of an online dashboard for accessing, reviewing and identifying and categorizing security reports and alerts; Providing temporary use of non-downloadable software featuring an online dashboard for reviewing user activity logs and historical security data and running reports; Providing non-downloadable software for use as an application programming interface (API); Computer services, namely, providing independent scoring service related to cyber identity risk; Providing non-downloadable software for providing real-time and historical reports tracking user identity and authentication and access across all computer and online environments |