Promoting the use of security assurance best practices of others in the fields of business computing and data governance; computer file management; updating and maintenance of data in computer databases; business assistance services, namely, assisting businesses with assessing, guarding against and addressing cybersecurity threats to business systems; data collection service for business purposes using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; Software as a service (SaaS) service featuring software for discovering, collecting, classifying, controlling access, and evaluation of data, removing exposures, automating processes, and monitoring, detecting and reporting on cyberattacks and similar security risks and threats, in the fields of cybersecurity and data governance; software as a services (SaaS) featuring data automation software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; technology consultation in the field of cybersecurity and data governance; cybersecurity and data governance services in the nature of restricting unauthorized access to computer systems; computer security consultancy; data security consultancy; design and development of electronic data security systems; computer security threat analysis for protecting data; computer services, namely, data recovery services; design, development, installation, maintenance and updating of computer software in the fields of cybersecurity and data governance; development of customized software for others for use in risk assessment, data governance, information security, business analysis, audit and audit planning; computer security services, namely restricting unauthorized access to computer networks; data automation and collection service using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; providing online, non-downloadable software for data collection processing using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; artificial intelligence as a service (AIaaS) services featuring software using artificial intelligence for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software using artificial intelligence for identifying data security vulnerabilities and breaches and providing alerts; providing an interactive web site featuring technology that enables users to enter, access, track, manage, monitor and generate information and reports regarding their in-house cybersecurity and data governance; providing an interactive web site featuring technology that enables users in controlling, managing, monitoring, reporting on, classifying, managing permissions for, auditing and analyzing data access and usage; software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for developing custom security threat detection, investigation, and response tools; software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer security software for computer, software applications, cloud, and computer network security, automated domain threat protection and prevention, analysis and management of computer threat data, security information and event management, detection, and elimination of computer threats, cyberattacks and data breaches, exploit protection and prevention, and automated remediation and restoration of compromised computer software and hardware; technical support services, namely, troubleshooting of computer software and computer security problems
Promoting the use of security assurance best practices of others in the fields of business computing and data governance; computer file management; updating and maintenance of data in computer databases; business assistance services, namely, assisting businesses with assessing, guarding against and addressing cybersecurity threats to business systems; data collection service for business purposes using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; Software as a service (SaaS) service featuring software for discovering, collecting, classifying, controlling access, and evaluation of data, removing exposures, automating processes, and monitoring, detecting and reporting on cyberattacks and similar security risks and threats, in the fields of cybersecurity and data governance; software as a services (SaaS) featuring data automation software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; technology consultation in the field of cybersecurity and data governance; cybersecurity and data governance services in the nature of restricting unauthorized access to computer systems; computer security consultancy; data security consultancy; design and development of electronic data security systems; computer security threat analysis for protecting data; computer services, namely, data recovery services; design, development, installation, maintenance and updating of computer software in the fields of cybersecurity and data governance; development of customized software for others for use in risk assessment, data governance, information security, business analysis, audit and audit planning; computer security services, namely restricting unauthorized access to computer networks; data automation and collection service using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; providing online, non-downloadable software for data collection processing using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; artificial intelligence as a service (AIaaS) services featuring software using artificial intelligence for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software using artificial intelligence for identifying data security vulnerabilities and breaches and providing alerts; providing an interactive web site featuring technology that enables users to enter, access, track, manage, monitor and generate information and reports regarding their in-house cybersecurity and data governance; providing an interactive web site featuring technology that enables users in controlling, managing, monitoring, reporting on, classifying, managing permissions for, auditing and analyzing data access and usage; software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for developing custom security threat detection, investigation, and response tools; software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer security software for computer, software applications, cloud, and computer network security, automated domain threat protection and prevention, analysis and management of computer threat data, security information and event management, detection, and elimination of computer threats, cyberattacks and data breaches, exploit protection and prevention, and automated remediation and restoration of compromised computer software and hardware; technical support services, namely, troubleshooting of computer software and computer security problems
Providing online, non-downloadable software for data collection processing using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; providing a website with functionality for data collection processing services using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data
Office functions in the nature of data search in computer files for others for the purpose of locating and reporting cyberattacks or similar security risks and threats | Software as a service (SAAS) service featuring software for collecting, controlling and evaluation of data, as well as for monitoring and reporting on cyberattack or similar security risks and threats, all in the fields of cybersecurity and data governance ; technology consultation in the field of cybersecurity and data governance; Cybersecurity and data governance services in the nature of detecting suspicious activity and unusual behavior, cyberattack, or similar security risks and threats being computer security threat analysis for protecting data; Computer security threat analysis for protecting data; Computer security services, namely, restricting unauthorized access to computer networks; Data automation service using proprietary software to collect, evaluate, manage, monitor and analyze data in order to detect suspicious activity and unusual behavior, cyberattacks, or similar security risks and threats; Data collection and management services using proprietary software to collect, control, evaluate, manage, monitor, and report data for purposes of preventing cyberattack or similar security risks and threats
technology consultation in the field of cybersecurity and data governance; cybersecurity and data governance services in the nature of managing data access control, in particular restricting unauthorized access to computer data systems; data security consultancy; Data automation service using proprietary software to evaluate, monitor, analyze, organize, and manage data access permissions
Data collection processing services using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data; "CLOUD"; Software as a services (SAAS) featuring data automation software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data
Promoting the use of security assurance best practices of others in the fields of business computing and data governance; computer file management; updating and maintenance of data in computer databases; business assistance services, namely, assisting businesses with assessing, guarding against and addressing cybersecurity threats to business systems
Promoting the use of security assurance best practices of others in the fields of business computing and data governance; computer file management; updating and maintenance of data in computer databases; business assistance services, namely, assisting businesses with assessing, guarding against and addressing cybersecurity threats to business systems | Technology consultation in the field of cybersecurity and data governance; cybersecurity and data governance services in the nature of restricting unauthorized access to computer systems; computer security consultancy; data security consultancy; design and development of electronic data security systems; computer security threat analysis for protecting data; computer services, namely, data recovery services; development of customized software for others for use in risk assessment, data governance, information security, business analysis, audit and audit planning; computer security services, namely, restricting unauthorized access to computer networks; design, development, installation, maintenance and updating of computer software in the fields of cybersecurity and data governance; software as a service (SAAS) services featuring software for restricting unauthorized access to computer networks, computer security threat analysis for protecting data, assessing data recovery risk, governing data, providing information security services, analyzing business data, and auditing and audit planning, all in the fields of cybersecurity and data governance
Computer software for use in controlling, managing, monitoring, reporting on, classifying, managing permissions for, auditing and analyzing data access and usage; computer software for use in storing, classifying, retrieving, finding and collaborating on data; computer software for identifying data security vulnerabilities and breaches and providing alerts; computer software for sharing and migrating data
Computer software for use in monitoring, analyzing, and profiling user data for suspicious activity and unusual behavior; software for monitoring data assets that may be threatened or compromised by ransomware or a cyberattack; software for detecting and alerting on file and email activity and/or user behavior that may indicate a security risk
computer software for use in controlling, managing, monitoring, reporting on, classifying, managing permissions for, auditing and analyzing data access and usage; computer software for use in storing, classifying, retrieving, finding and collaborating on data; computer software for identifying data security vulnerabilities and breaches and providing alerts; computer software for sharing and migrating data | data automation and collection service using proprietary software to collect, control, evaluate, manage, monitor, report on, classify, manage permissions for, audit and analyze data