Publication Registration: |
Wednesday, February 10, 2021 |
Goods and Services Information
|
Description:
|
(1) - Computer software, namely downloadable computer programs and computer application software for mobile phones, namely, software for network security and authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; computer software for use in the field of network management, security and authentication; computer software for use with multi-factor authentication; downloadable computer software, namely, software used for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
(2) - Providing temporary use of non-downloadable computer programs for protecting cybersecurity assets, for network defense and for monitoring, assessing and implementing improvements in security of network infrastructure and data; providing online non-downloadable software providing protection to cybersecurity assets and computer networks from malware, phishing and malicious advertising; providing online non-downloadable software for gathering information from malicious computer hosts, providing alerts on malware attacks, and for reporting of phishing emails
(3) - Computer software, namely downloadable computer programs and computer application software for mobile phones, namely, software for network security and authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; computer software for use in the field of network management, security and authentication; computer software for use with multi-factor authentication; downloadable computer software, namely, software used for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
(4) - Providing temporary use of non-downloadable computer programs for protecting cybersecurity assets, for network defense and for monitoring, assessing and implementing improvements in security of network infrastructure and data; providing online non-downloadable software providing protection to cybersecurity assets and computer networks from malware, phishing and malicious advertising; providing online non-downloadable software for gathering information from malicious computer hosts, providing alerts on malware attacks, and for reporting of phishing emails
|