Class 042: Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability.
Class 042: Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability.
ATTACK GRAPH ANALYSIS; Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability.
Downloadable software for monitoring computer security; downloadable computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; downloadable computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; recorded software for monitoring computer security; recorded computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; recorded computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
Downloadable software for monitoring computer security; downloadable computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; downloadable computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; recorded software for monitoring computer security; recorded computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; recorded computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; "CYBER"; Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based software for protecting computer security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
Computer security software; computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment | Update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability