Class 035: Business investigations using Open Source Intelligence (OSINT); Class 042: Providing temporary use of non-downloadable computer software, namely, user-agent anomaly detection (UAAD) tools, and web crawler software in the fields of identifying the digital footprint of a website and for analysis of assets belonging to a website's domain; computer security threat analysis for protecting computer data including data containing personal and financial information; penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; virtual chief information security officer (VCISO) services, namely, technology consultation in the field of cybersecurity; defensive support, namely, technology consultation in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; testing of computer software, namely, web application and Application Programming Interface (API) testing; Testing of computer software, namely, mobile application testing; testing of new products, namely, wireless electronic devices for others; testing of computer hardware in the Internet of things (IoT); electronic monitoring of digital asset activity to detect fraud via the Internet; threat landscape awareness, namely, providing information in the field of website security via the Internet
providing temporary use of non-downloadable computer software, namely, web crawler software in the fields of identifying the digital footprint of a website and for analysis of assets belonging to a website's domain, and domain-wide inventory and assessment software tools, all of which generate reports regarding threats, misconfigurations, and vulnerabilities of websites; computer security threat analysis for protecting data, including data containing personal and financial information; consulting in the field of monitoring of computer systems for detecting unauthorized access and data breach