A network monitoring, reporting and risk mitigation system collects events at a computing device within the local network to provide improved network security. The events are aggregated into alerts, which may be processed according to triggering definitions in order to create ARO (action, recommendations and observations) reports providing required or recommended actions to take or observations to a network administrator. The ARO reports may be processed by a remote server in order to generate contextual feedback for updating the triggering definitions.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software; downloadable security software, namely,software for testing and simulating security conditions and capabilities in simpleand complex environments; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields ofcomputer, network and internet security; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable computer software for identifying security risks and threats in real and simulated environments; recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security; Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments. Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security; Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments. Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security; Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Recorded and downloadable security software, namely, cybersecurity and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cybersecurity and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments. Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security; Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments (1) Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security; Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments (1) Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Recorded and downloadable security software, namely, cybersecurity and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cybersecurity and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security; downloadable security software, namely, software for testing and simulating security conditions and capabilities in simple and complex environments; downloadable computer software for identifying security risks and threats in real and simulated environments (1) Providing online non-downloadable security software for monitoring, analysing and protecting IT, IT systems, cloud systems, networks and endpoints, and for training, simulation and testing in the field of IT security; computer security services, namely, for monitoring, identifying, reviewing and resolving operational issues, IT security threats and system data, and for restricting unauthorized access to computer hosts; network security and internet security services, namely, monitoring and management of network security software and hardware, identifying and resolving operational issues, IT security threats on networks and devices, and anomalies in client cloud-based services infrastructure; automated security software and hardware testing; computer security consultancy; onsite and remote management of the IT systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
11.
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO AN OPERATING SYSTEM KERNEL DRIVER
Computing systems and methods are provided for controlling access to a kernel driver in an operating system. In particular, the processor of a computer loads a defensive kernel driver. The processor then monitors a plurality of loaded kernel drivers. It then detects a vulnerable kernel driver from amongst the plurality of loaded kernel drivers, and the vulnerable drive matching an entry on a vulnerable kernel driver list. It then hooks the defensive driver into the vulnerable kernel driver. The processor then intercepts request data, such as input/output request packets (IRPs), with the defensive kernel driver, evaluates the same, and, after determining the request data is safe, forwards the request data to the vulnerable kernel driver.
G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/82 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion
Ransomware attacks may be prevented by monitoring file access requests. When a process requests a directory listing, the results provided may be modified based on whether the process is trusted or not. For trusted processes, the results provided are the actual directory listing, while the results provided to processes that aren't trusted may be modified to include seeded files. Access to the seeded files may be monitored to determine if the process is associated with a ransomware attack, and steps taken to mitigate an attempted ransomware attack. Ransomware may also be prevented by ensuring that only trusted processed are allowed to access certain files. In order to provide an improved user experience, the processes can be determined automatically from a system structure and their trustworthiness determined.
Controlling code execution on a computing device may prevent malicious code from executing. In order to control code execution, context information for code packages on the computing device can be maintained. The context information may be generated upon initialization of the computing device or if changes to the code package are made. The context information may be used in conjunction with access control lists (ACLs) and/or execution control lists (ECLs) in order to quickly evaluate whether a code package should be allowed to execute.
A roaming domain name system (DNS) firewall is provided for execution by an endpoint agent provided on a mobile computing device. The increase of the mobile workforce presents security challenges as mobile computer devices are regularly connecting to unknown, untrusted or unverified networks. These networks can present security risks to organizations by routing URL resolutions requests to malicious DNS servers that may be utilized for redirecting traffic to unsafe hosts. A roaming DNS firewall on the mobile computing device monitors access to networks to determine if the network is deemed safe or unsafe based upon associated network parameters. In response to the determination of an unsafe network the DNS identifiers are modified or trusted to a trusted DNS to ensure DNS requests are not processed by a malicious DNS host.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security Software. Providing on-line non-downloadable security software; computer, network and internet security services; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer host and network security services; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security Software. Providing on-line non-downloadable security software; computer, network and internet security services; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer host and network security services; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security Providing on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; Providing on-line non-downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; Providing on-line non-downloadable security software for training, simulation and testing in the field of cyber security and IT security; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; computer network security services, namely, reviewing system data in the nature of logs and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; automated security computer software and computer hardware testing; computer security services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer security services, namely, restricting unauthorized access to computer hosts and computer network security services; computer services, namely, on-site and remote management of the information technology (IT) systems of others being automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; automated security software and hardware testing
18.
Systems and methods for network monitoring, reporting, and risk mitigation
A network monitoring, reporting and risk mitigation system collects events at a computing device within the local network to provide improved network security. The events are aggregated into alerts, which may be processed according to triggering definitions in order to create ARO (action, recommendations and observations) reports providing required or recommended actions to take or observations to a network administrator. The ARO reports may be processed by a remote server in order to generate contextual feedback for updating the triggering definitions.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security Software. Providing on-line non-downloadable security software; providing on-line non-downloadable security software featuring analytic optimization and operational scaling for use in identification, assessment and response to security risks and threats; computer, network and internet security services; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; computer host and network security services; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security.
20.
ENDPOINT DETECTION AND RESPONSE TO CYBERSECURITY THREATS
Controlling code execution on a computing device may prevent malicious code from executing. In order to control code execution, context information for code packages on the computing device can be maintained. The context information may be generated upon initialization of the computing device or if changes to the code package are made. The context information may be used in conjunction with access control lists (ACLs) and/or execution control lists (ECLs) in order to quickly evaluate whether a code package should be allowed to execute.
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
Ransomware attacks may be prevented by monitoring file access requests. When a process requests a directory listing, the results provided may be modified based on whether the process is trusted or not. For trusted processes, the results provided are the actual directory listing, while the results provided to processes that aren't trusted may be modified to include seeded files. Access to the seeded files may be monitored to determine if the process is associated with a ransomware attack, and steps taken to mitigate an attempted ransomware attack. Ransomware may also be prevented by ensuring that only trusted processed are allowed to access certain files. In order to provide an improved user experience, the processes can be determined automatically from a system structure and their trustworthiness determined.
A roaming domain name system (DNS) firewall is provided for execution by an endpoint agent provided on a mobile computing device. The increase of the mobile workforce presents security challenges as mobile computer devices are regularly connecting to unknown, untrusted or unverified networks. These networks can present security risks to organizations by routing URL resolutions requests to malicious DNS servers that may be utilized for redirecting traffic to unsafe hosts. A roaming DNS firewall on the mobile computing device monitors access to networks to determine if the network is deemed safe or unsafe based upon associated network parameters. In response to the determination of an unsafe network the DNS identifiers are modified or trusted to a trusted DNS to ensure DNS requests are not processed by a malicious DNS host.
A network monitoring, reporting and risk mitigation system collects events at a computing device within the local network to provide improved network security. The events are aggregated into alerts, which may be processed according to triggering definitions in order to create ARO (action, recommendations and observations) reports providing required or recommended actions to take or observations to a network administrator. The ARO reports may be processed by a remote server in order to generate contextual feedback for updating the triggering definitions.
Ransomware attacks may be prevented by monitoring file access requests. When a process requests a directory listing, the results provided may be modified based on whether the process is trusted or not. For trusted processes, the results provided are the actual directory listing, while the results provided to processes that aren't trusted may be modified to include seeded files. Access to the seeded files may be monitored to determine if the process is associated with a ransomware attack, and steps taken to mitigate an attempted ransomware attack. Ransomware may also be prevented by ensuring that only trusted processed are allowed to access certain files. In order to provide an improved user experience, the processes can be determined automatically from a system structure and their trustworthiness determined.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software. Providing temporary use of on-line non-downloadable security software; computer, network and internet security services; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security.
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software. Providing a virtualized computer software and hardware environment for training purposes in the field of computer and software security. Providing temporary use of on-line non-downloadable security software; providing temporary use of on-line non-downloadable computer software for identifying security risks and threats in real and simulated environments; providing temporary use of on-line non-downloadable security simulation software for measuring and tracking student and participant progress.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software. Providing temporary use of on-line non-downloadable security software; computer, network and internet security services; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer host and network security services.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security, the aforementioned goods solely in the field of security risks, security threats and security events in the fields of computer, network and internet security. Computer, network and internet security services; computer services, namely, identifying, analyzing, reporting on and responding to security risks, security threats and security events; Providing temporary use of on-line non-downloadable security software; computer security consultancy; Providing temporary use of on-line nondownloadable computer software for identifying security risks and threats in real and simulated environments and security events and providing reports to customers; providing information in the field of computer, network and internet security risks, threats and events; providing technical information in the field of computer, network and internet security risks, threats and events, the aforementioned services solely in the field of security risks, security threats and security events in the fields of computer, network and internet security.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for ensuring computer, network and internet security; downloadable electronic publications in the nature of customized customer reports in the fields of cyber security risks, computer security threats and cyber security events regarding computer, network and internet security Computer, network and internet security services, namely, restricting unauthorized access to data at rest on hard drives, computer networks, cloud services and websites; computer security services being cybersecurity services in the nature of identifying, analyzing, reporting on and responding to security risks, security threats and security events; Providing temporary use of on-line non-downloadable software for use in restricting unauthorized access to data at rest on hard drives, computer networks, cloud services and websites; computer security consultancy; providing temporary use of on-line non-downloadable computer software for identifying and reporting cyber security risks, computer security threats and cyber security events on computers, computer networks and websites; providing information in the field of cybersecurity in the nature of computer, network and internet security risks, threats and events; providing technical information in the field of cybersecurity in the nature of computer, network and internet security risks, threats and events
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software; downloadable electronic publications in the nature of customer reports on security risks, security threats and security events in the fields of computer, network and internet security. (1) Computer, network and internet security services, namely, computer network security services, computer network security consultancy, internet security consultancy, consultancy services in the field of security for computers and computer networks, monitoring of computer systems for detecting unauthorized access or data breach, cloud services in the nature of monitoring of computer systems for detecting unauthorized access or data breach; computer services, namely, identifying, analyzing, reporting on and responding to security risks, security threats and security events; Providing temporary use of on-line non-downloadable security software; computer security consultancy; Providing online non-downloadable software for use in analyzing and benchmarking cybersecurity risk and providing reports to customers; software as a service (SAAS) services featuring non-downloadable software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; platform as a service (PAAS) services featuring non-downloadable software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; providing temporary use of non-downloadable software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; Providing temporary use of on-line non-downloadable security software; providing information in the field of computer, network and internet security risks, threats and events; providing technical information in the field of computer, network and internet security risks, threats and events.
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software. Training in the field of computer security, software security, and IT security. Design and development of security software; computer security consultancy; software security consultancy in the field of IT and IT security, including identifying system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system; IT security consulting; computer network security services, namely, reviewing system data (e.g. logs) and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware, etc; computer services, namely, identifying, analyzing and responding to security risks and security threats; designing and architecting secure computer systems, secure computer networks and security solutions; computer security services, namely, identification of computer system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system.
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software. Training in the field of computer security, software security, and IT security. Design and development of security software; computer security consultancy; software security consultancy in the field of IT and IT security, including identifying system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system; IT security consulting; computer network security services, namely, reviewing system data (e.g. logs) and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware, etc; computer services, namely, identifying, analyzing and responding to security risks and security threats; designing and architecting secure computer systems, secure computer networks and security solutions; computer security services, namely, identification of computer system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system.
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
Recorded and downloadable security software, namely, cyber security and IT security software that provides cloud, network and endpoint monitoring for security threats and vulnerabilities; recorded and downloadable security software for training, simulation and testing in the field of cyber security and IT security Educational services, namely, providing online instruction in the field of computer and software security via an online, virtualized computer software and hardware environment for training purposes Design and development of security software; computer security consultancy; software security consultancy in the field of IT and IT security, including identifying system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system; IT security consulting; computer network security services, namely, reviewing system data in the nature of logs and architecture, providing recommendations for improvement; internet security services, namely, monitoring and management of network security software and hardware; computer services, namely, identifying, analyzing and responding to security risks and security threats; designing and architecting secure computer systems, secure computer networks and security solutions; Providing temporary use of on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer hosting services, namely, providing hosted deployments of IT and IT system monitoring, analysis and protection capabilities and computer network security services, namely, monitoring on premise networks, endpoints, as well as cloud-based services and infrastructure Computer security services, namely, identification of computer system vulnerabilities, configuration issues, and all-hazard threats (measured and theoretical) that could affect the system
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software (1) Providing a virtualized computer software and hardware environment for training purposes in the field of computer and software security
(2) Design and development of security software; computer, software and IT security consulting and training; computer, network and internet security services; computer services, namely, identifying, analyzing and responding to security risks and security threats; designing and architecting secure computer systems, networks and security solutions; Providing temporary use of on-line non-downloadable security software; automated security software and hardware testing; computer security consultancy; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security; computer host and network security services; computer software for identifying security risks and threats in real and simulated environments; providing temporary use of on-line non-downloadable security simulation software for measuring and tracking student and participant progress
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
[ Security software, namely, IT and IT system monitoring and protection, including for IT security threats ] Providing temporary use of on-line non-downloadable security software in the nature of IT and IT system monitoring, analysis and protection, including for IT security threats; computer security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on endpoint systems; network security services, namely, monitoring for, identifying, and resolving operational issues, including IT security threats on networks and network devices; internet security services, namely, monitoring and identifying anomalies, including security threats, in client cloud-based services infrastructure; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer hosting services, namely, providing hosted deployments of IT and IT system monitoring, analysis and protection capabilities and computer network security services, namely, monitoring on premise networks, endpoints, as well as cloud-based services and infrastructure
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Security software, namely, software for testing and simulating security conditions, and capabilities in simple and complex environments; computer software for identifying security risks and threats in real and simulated environments Educational services, namely, providing a virtualized computer software and hardware environment in classrooms, office environments, via video teleconference, as well as any place with an internet-accessible computer system featuring training in the field of computer and software security Providing temporary use of on-line non-downloadable security simulation software for measuring and tracking student and participant progress
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software (1) Design and development of security software; computer, software and IT security consulting and training; computer, network and internet security services; computer services, namely, identifying, analyzing and responding to security risks and security threats; designing and architecting secure computer systems, networks and security solutions
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software (1) Providing temporary use of on-line non-downloadable security software; computer, network and internet security services; automated security software and hardware testing; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer security consultancy; automated provisioning, testing and validation of virtual and physical computer systems and software in the field of computer and software security
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software (1) Providing temporary use of on-line non-downloadable security software; computer, network and internet security services; computer services, namely, identifying, analyzing and responding to security risks and security threats; computer host and network security services
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Security software (1) Providing a virtualized computer software and hardware environment for training purposes in the field of computer and software security
(2) Providing temporary use of on-line non-downloadable security software; computer software for identifying security risks and threats in real and simulated environments; providing temporary use of on-line non-downloadable security simulation software for measuring and tracking student and participant progress