Goods and Services | Downloadable and recorded computer software for providing security to computer networks; Downloadable and recorded security
software for end-to-end encrypted instant messaging featuring messaging, audio and video calling, and electronic signatures;
Downloadable and recorded security software for monitoring and controlling computer and online activity; Downloadable and
recorded security software, namely, identity management software for ensuring the security of computer networks and databases;
Downloadable and recorded security software for database computer code management for computer security purposes;
Downloadable and recorded computer software for use in computer access control; Downloadable and recorded computer
software for data and document capture, transmission, storage and indexing; Downloadable and recorded data processing
software; Downloadable and recorded data communications software; Downloadable and recorded computer software for digital
information and data access; Downloadable security software for end-to-end encrypted instant messaging featuring messaging,
audio and video calling, and electronic signatures; Downloadable security software for monitoring and controlling computer and
online activity; Downloadable security software, namely, identity management software for ensuring the security of computer
networks and databases; Downloadable security software for database computer code management for computer security
purpose; Downloadable and recorded authentication software for controlling access to and communications with computers and
computer networks; Downloadable computer software and firmware for user authentication services using risk-based multifactor
authentication; Downloadable computer software and firmware for monitoring of computers for security purposes, namely,
computer security services for protecting data and information from unauthorized access; Downloadable computer software for
the monitoring of password and security compliance, namely, monitoring of accounts and granting and revoking permissions to
access computer networks; Downloadable and recorded computer software for user account lifecycle management, namely,
software for use in the creation and management of databases and information directories used to store system content, data
lifecycle management, namely, managing the creation, modification, maintenance, renewal, and disposal of data generated during
company operations, e-mail management, contact lifecycle management, namely, managing the creation, modification,
maintenance, renewal, and disposal of contact information for employees, customers and partners |
Goods and Services | Development of computer programmes for data processing; database design and development; providing information, advice and
consultancy services in the field of computer software, namely, software for providing security to computer networks; maintenance
of computer software; Rental of software for providing security to computer networks and maintenance of software; computer
systems analysis; design and development of on-line computer software systems; computer software development, namely,
development of software to provide IT security; data security services, namely, data security consultancy and computer security
threat analysis for protecting data; Provision of data security services for computer networks and computer access and
computerized transactions, namely, data encryption services; Development of computer software for computer security
management and database security management; provision of security services for computer networks in the nature of
administering digital keys; Computer security services, namely, restricting unauthorized access to computer networks; design and
development of electronic data security systems; maintenance of computer software relating to computer security and prevention
of computer risks; updating of computer software relating to computer security and prevention of computer risks; providing on-line
non-downloadable authentication software for controlling access to and communications with computers and computer networks;
Computer security services that restricts unauthorized network access in the field of providing real-time enterprise and cloud application protection and security using zero trust authentication, namely, the protection of a company's network and data
through strict identity authentication and authorization, to analyze network and server telemetry to establish baseline usage and to
implement policy automation to protect against abnormal behavior and cyber security threats; Computer security services,
namely, computer security threat analysis for protecting data, namely, monitoring computer systems for detecting unauthorized
access obtained by computer system login fraud, detecting and providing alerts for blocking bots, monitoring networking traffic for
security purposes, and detecting login fraud, account takeover fraud; Computer security threat analysis for protecting data;
Software as a Service (SaaS) services featuring computer software for using risk-based multifactor authentication; Software as a
Service (SaaS) services featuring computer software for user authentication using biometrics; Software as a Service (SaaS)
services featuring software using secure single sign on technology for computer user and computer application authentication
services; Software as a Service (SaaS) services featuring computer software to enable and manage access by permitted
individuals and by computer software programs to other computer software applications, web-based, mobile and legacy
applications, user directories that classify and store company system user information by type and organization, user databases,
mobile devices, and Internet-of-things (IoT) devices, the foregoing to enhance security; Software as a Service (SaaS) services
featuring computer software for monitoring of computers for security purposes, namely, computer security services for protecting
data and information from unauthorized access to computer networks by unverified users; Software as a service (SaaS) services
featuring software for performing and monitoring risk assessments, monitoring and assessing information technology security,
performing analysis of business records, and conducting audits; Platform as a Service (PaaS) services featuring computer
software platforms for user authentication using risk-based multifactor authentication; Platform as a Service (PaaS) services
featuring computer software platforms for user authentication services using biometrics; Platform as a Service (PaaS) services
featuring computer software platforms for user authentication services using behavioral analysis; Platform as a Service (PaaS)
services featuring computer software platforms for user authentication services using third-party authenticators; Platform as a
Service (PaaS) services featuring computer software platforms for user authentication services using combinations of methods of
authentication, namely, risk-based multifactor authentication, biometrics, device binding, namely, authentication through the
association between an account and a device without a password, behavioral analysis, and third-party authenticators; Platform as
a Service (PaaS) services featuring computer software platforms using secure single sign on technology, the foregoing used for
computer user and computer application authentication service; Platform as a Service (PaaS) services featuring computer
software platforms for providing access to other computer software applications, web-based computer software applications,
mobile and legacy computer applications, user directories that classify and store company system user information by type and
organization, user databases and mobile devices, the foregoing computer software platforms used to enhance computer security;
Platform as a Service Platform (PaaS) featuring computer software platforms to manage authentication and authorization of
individuals and computer software programs so that they can access computer software applications, web-based computer
software applications, mobile and legacy computer applications, user directories that classify and store company system user
information by type and organization, user databases and mobile devices, the foregoing computer software platforms used to
enhance computer security; Platform as a Service (PaaS) services featuring computer software platforms that help identify
technical computer anomalies during the identification authentication and authorization processes for user and computer program
authentication; Platform as a Service (PaaS) services featuring computer software platforms for use in monitoring of computers for
security purposes, namely, computer security services for protecting data and information from unauthorized access; Platform as
a Service (PaaS) services featuring firmware in the nature of computer software platforms for open authorization (OAUTH)
resource server, namely, a server that enables users to grant access without providing passwords, authorizing client applications
to access server resources, storing passwords, storing private encryption keys and securely transporting encrypted tokens;
Platform as a Service (PaaS) services featuring computer software platforms for monitoring of compliance with password security
measures; Platform as a Service (PaaS) services featuring computer software platforms for machine learning for training
computers to automate user authentication and security analysis |