Class 042: Software as a service (SAAS) services featuring software for creating, managing, and connecting code repositories; Software as a service (SAAS) services featuring software for creating structured and queryable representations of software code repositories; Software as a service (SAAS) services featuring software for scanning and identifying software code; Software as a service (SAAS) services featuring software using artificial intelligence for software development
Class 009: Downloadable software for creating, managing, and connecting code repositories; Downloadable software for creating structured and queryable representations of software code repositories; Downloadable software for scanning and identifying software code; Downloadable artificial intelligence software for software development
Class 042: Software as a service (SAAS) services featuring software for creating, managing, and connecting code repositories; Software as a service (SAAS) services featuring software for creating structured and queryable representations of software code repositories; Software as a service (SAAS) services featuring software for scanning and identifying software code; Software as a service (SAAS) services featuring software using artificial intelligence for software development; Software as a service (SAAS) services featuring software for collaboratively brainstorming, developing, managing, planning, coordinating, modifying, tracking, testing, reviewing, publishing, securing, monitoring, and archiving digital computer programs, documentation, technical documents, contracts, sprints, stories, bugs, issues
Charitable services, namely, organizing and conducting volunteer programs and community service projects; Developing and coordinating volunteer projects for charitable organizations; Administration of a program to promote community service
Software as a service (SAAS) services featuring software using artificial intelligence for software development; Software as a service (SAAS) services featuring software using artificial intelligence for collaboratively brainstorming, developing, managing, planning, coordinating, modifying, tracking, testing, reviewing, publishing, securing, monitoring, and archiving digital computer programs, documentation, technical documents, contracts, sprints, stories, bugs, issues
Class 042: Computer services, namely, hosting and maintaining an on-line web site for others for collaboratively brainstorming, developing, managing, planning, coordinating, modifying, tracking, testing, reviewing, publishing and archiving digital computer programs, documentation, technical, documents, contracts, sprints, stories, bugs and issues; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of cloud computing; IT consulting services relating to installation, maintenance and repair of computer software
Business management and organization consultancy; Advice and information concerning commercial business management; Business management consulting in the field of team development; Business consulting services in business leadership development and business management; Business advisory services in the fields of communication, collaboration, leadership, and teamwork; Business consulting services for individuals, businesses, and organizations in the fields of collaboration, teamwork, productivity, organizational skills, communication, and professional development; Business consulting services for individuals, businesses, and organizations in the fields of communication skills, leadership, teamwork, and business development; Providing business information in the fields of business management, professional development, teamwork, organizational unity, communication, and productivity via websites on a global computer network; Business consultation services
Business education and training services, namely, providing online programs, non-downloadable videos and presentations in the fields of collaboration, teamwork, productivity, organizational skills, communication, and professional development; Business education and training services, namely, providing online programs, non-downloadable videos and presentations in the fields of communication, collaboration, leadership, and teamwork; Educational services, namely, conducting online classes, conferences, seminars, workshops, and training programs in the fields of collaboration, teamwork, productivity, organizational skills, communication, and professional development; Business training in the field of business development, business management, communication skills, organizational development, and leadership development; Educational services, namely, conducting programs in the fields of business development, business management, communication skills, organizational development, and leadership development; Educational services, namely, providing online programs, non-downloadable webinars, and non-downloadable images and audio files, and online, non-downloadable tutorial videos in the fields of collaboration, teamwork, productivity, organizational skills, communication, and professional development
Downloadable computer software for creating and maintaining a dynamic software bill of materials that provides real-time inventory of software components across various computing environments, that provides management and real-time behavior analysis of the software components, and that provides a vulnerability assessment of the software components | Providing temporary use of on-line non-downloadable computer software for creating and maintaining a dynamic software bill of materials that provides real-time inventory of software components across various computing environments, that provides management and real-time behavior analysis of the software components, and that provides a vulnerability assessment of the software components
(Based on Intent To Use) Downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyberattack protection; (Based on Use in Commerce) Providing temporary use of on-line non-downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyber-attack protection
Downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyberattack protection; Providing temporary use of on-line non-downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyber-attack protection
Downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyberattack protection; Providing temporary use of on-line non-downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyber-attack protection
Downloadable computer software for analyzing application-level and code vulnerabilities across microservices and delivering risk assessment to resolve code vulnerabilities; downloadable software for analyzing applications' source code; downloadable software for detecting, reporting, mitigating and resolving vulnerabilities in applications' software code; downloadable electronic publications in the nature of white papers, research papers, and case studies in the field of application security; downloadable computer software for cyber security for searching, evaluating, and fixing open source and application code vulnerabilities; downloadable computer application software for cyber security for searching, evaluating, and fixing open source and application and compute software vulnerabilities; security control apparatus, namely, downloadable software applications and downloadable computer programs for analyzing application-level and code vulnerabilities across microservices and delivering risk assessment to resolve code vulnerabilities; electronic publications, recorded on digital media, and downloadable publications, namely, manuals, white papers and newsletters featuring information in the fields of cyber security, applications and open source software; apparatus for recording, transmission or reproduction of sound or images; blank digital recording media, namely, magnetic data carriers, recording discs, compact discs, and blank DVDs; Providing online non-downloadable computer software for analyzing application-level and code vulnerabilities across microservices and delivering risk assessment to resolve code vulnerabilities; consulting services in the field of computer application security; providing online non-downloadable computer software for cyber security for searching, evaluating, and fixing open source and application code vulnerabilities; software as a service (SaaS) services featuring software to enable software engineers to identify and fix security bugs and vulnerabilities; scientific research and product development services in the field of software application security; software as a service (SAAS) featuring on-line non-downloadable software platform for use in software application security testing and for detecting, reporting and remediating vulnerabilities in software and applications; cloud computing services featuring software featuring for storage of data in databases in the field of computer application security; consulting services in the field of detecting vulnerabilities in software and computer applications code and describing mitigation techniques; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems and maintenance of computer software in the field of computer application security; scientific and technological services, namely, research and design in the fields of cyber security, computer software and open source software; computer services, namely, providing temporary use of online, non-downloadable cyber security and web security software for identifying, eliminating risks and resolving code vulnerabilities for application security, application security testing, supply chain security, runtime application security, cloud native application security, application programming interface (API) security, application programming interface (API) security testing, static application security testing, dynamic application security testing, source composition analysis, and software bill of materials (SBOM) creation; design and development of electronic data and application security systems; computer consultation in the field of computer and internet security; design and development of internet security computer programs and applications; design and development of computer hardware and software; consulting services in the field of software as a service; technology and computer consultancy services in the field of software for identifying, eliminating risks and resolving code vulnerabilities for application security, application security testing, supply chain security, runtime application security, cloud native application security, application programming interface (API) security, application programming interface (API) security testing, static application security testing, dynamic application security testing, source composition analysis, and software bill of materials (SBOM) creation; the provision of information, advice and consultancy relating to all of the aforesaid.
Class 042: Providing temporary use of on-line non-downloadable computer software for use in managing enforcement of security posture controls, continuous integration controls, and continuous deployment controls and policies
Providing temporary use of on-line non-downloadable computer software for creating and maintaining a software bill of materials for a cloud-based environment
Class 042: Providing temporary use of on-line non-downloadable computer software for security vulnerability analysis and exploitability validation in a cloud-based environment
Downloadable software for use in a managed observability platform that allows users to view software performance analytics, data and metrics and access business analytics of user data; downloadable software for use in workload and performance management of software applications in distributed computing environments; downloadable software for indexing and making searchable data from any application, server or network device for the purpose of visualizing, accessing and running logs, metrics, traces, alerts and queries; downloadable software for use in application and server infrastructure performance management; Cloud computing services featuring software for indexing and making searchable data from any application, server or network device for the purpose of visualizing, accessing and running logs, metrics, traces, alerts and queries
Downloadable computer software platforms for collaboratively brainstorming, developing, managing, planning, coordinating, modifying, tracking, testing, reviewing, publishing and archiving digital computer programs, documentation, technical, documents, contracts, sprints, stories, bugs and issues; Computer services, namely, hosting and maintaining an on-line web site for others for collaboratively brainstorming, developing, managing, planning, coordinating, modifying, tracking, testing, reviewing, publishing and archiving digital computer programs, documentation, technical, documents, contracts, sprints, stories, bugs and issues; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of cloud computing; IT consulting services
Downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyberattack protection | Providing temporary use of on-line non-downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyber-attack protection
Downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyberattack protection | Providing temporary use of on-line non-downloadable computer software for application configuration, vulnerability management, network segmentation, network firewalling, network traffic visibility, system integrity measurement, system integrity attestation, system integrity monitoring, code-level provenance visibility, code-level attestation, risk scoring of code repositories, risk scoring of scripts, risk scoring of binaries, and malware and cyber-attack protection
Evaluations and estimations in scientific and technologic domains made by engineers; technical debt, namely, providing engineering services in the field of software development outcomes and consequences in order to maintain or reduce the complexity of evolving software programs; design and development of computers and software; [research and development of new products for third parties] studies of technical projects, namely, providing engineering services; architectural design services of software; installation, maintenance, update or leasing of software; computer programming; analysis of computer systems; design of computer systems; consultation in matters of design and development of computers; providing information about cloud computing; advice in the field of information technology security
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.