Class 042: Providing temporary use of on-line non-downloadable computer software for monitoring, identifying, evaluating, diagnosing, and mitigating cyber risks, fraud, and scams, designed for use in information, computer, and internet security by individuals and organizations; Providing online non-downloadable computer software platform for cyber security, namely providing advanced threat detection, vulnerability management, pre-crime detection and prevention, and automated response capabilities to enhance cybersecurity and protect sensitive data
Providing a web-based computer software for monitoring, identifying, evaluating, diagnosing, and mitigating cyber risks, fraud, and scams, designed for use in information, computer, and internet security by individuals and organizations; Web-based computer software platform for cyber security, namely providing advanced threat detection, vulnerability management, pre-crime detection and prevention, and automated response capabilities to enhance cybersecurity and protect sensitive data
downloadable software for monitoring, identifying, assessing, diagnosing, and eliminating cyber risks and cyber threats for use in information security, computer security, and internet security by individuals and organizations; Information Technology (IT) technical support namely, troubleshooting, monitoring technological functions, and providing backup for the security of networks, hardware, software, applications, digital devices, digital data, and mobile devices; Information Technology (IT) architecture security and technical consultancy, namely, recommendations on secure data control solutions, software solutions, computer systems, computer networks, computer hardware, information storage options, information retrieval options, and overarching Information Technology (IT) system design to prevent information security vulnerability; Information Technology (IT) computer security consultancy in the fields of cyber threat analysis, cyber threat intelligence, information security risk assessment, security operations incident response strategies, development of security systems, contingency planning, systems hardening, compliance risk assessment, and information security risk management; Information Technology (IT) computer security testing, namely, scanning and penetration testing of computers and networks to assess information and systems vulnerability; Software as a Service (SaaS), namely, providing temporary use of non-downloadable software for monitoring, identifying, assessing, diagnosing, and eliminating cyber risks and cyber threats for use in information security, computer security, and internet security by individuals and organizations; development of customized software for monitoring, identifying, assessing, diagnosing, and eliminating cyber risks and cyber threats for use in information security, computer security, and internet security by individuals and organizations
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.