VERCARA

Welcome to the Brand page for “VERCARA”, which is offered here for Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring it information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing (ip) address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using ip address; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, recursive domain name server (dns) services; downloadable software for identification and tracking of ip addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (mrti) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity;providing multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services; domain name system management services; domain name system usage and efficiency monitoring and reporting services; communication services, directing and managing of internet traffic;business data analysis, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled;non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing dns, web application, network security, ddos, web application firewall (waf), bot management, website monitoring and website load testing services to others; providing on-line searchable databases featuring it information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (ip) address verification services; providing online searchable databases featuring the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by ip address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; non-downloadable software provided online for compiling and organizing statistical analysis of business functions; non-downloadable software provided online which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of on-line non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (ddos) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters dns queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for domain name system (dns resolution services); computer security threat analysis for protecting data by protecting online businesses from the effects of dns-based ddos attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, dns data exfiltration, and advanced zero-day attacks; providing temporary use of on-line non-downloadable website software application and api security and threat detection, mitigation and resolution services, a web application firewall (waf) that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (api's); electronic monitoring of website software applications and api's for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and api's; computer security services, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and api's, mitigating against and defending attacks against website software applications and api's and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; dns resolver services that make dns queries faster and more secure for faster and more private browsing of the internet, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global dns resolution service, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (dns) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service (ddos) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing on-line non-downloadable software for use in providing threat detection, mitigation and resolution services; providing on-line non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; consultation and technical consultation in the fields of network security, computer security, firewalls, dns-based ddos attacks, malware, ransomware, phishing, dns data exfiltration, advanced zeroday attacks, and threat detection, mitigation and resolution services; consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, dns-based ddos attacks, malware, ransomware, phishing, dns data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; consultation and technical consultation in the field of global computer information network connectivity and telecommunication hardware and software; internet routing system services; domain name server (dns) resolver services that make dns queries faster and more secure for faster and more private browsing of the internet; global dns resolution service as an alternative to dns providers; non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; non-downloadable computer software for the directing and managing of internet traffic; non-downloadable computer software for use in a wide range of transactions and telecommunications over the global computer information network; non-downloadable software for internet directory services, recursive dns services; non-downloadable software for threat detection, mitigation and resolution services; non-downloadable software for bot management, mitigation, protection and guarding; non-downloadable software for business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; consultation and technical consultation in the field of internet routing system services, dns resolver services and global dns resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall (waf) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (api) software; providing temporary use of non-downloadable software electronic monitoring of website software applications and api's for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and api's; computer security services, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and api's, mitigating against and defending attacks against website software applications and api's and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; consultation and technical consultation in the fields of api security, network security, computer security, firewalls, dns-based ddos attacks, malware, ransomware, phishing, dns data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services, consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, dns-based ddos attacks, malware, ransomware, phishing, dns data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; internet routing system services; dns resolver services that make dns queries faster and more secure for faster and more private browsing of the internet; global dns resolution service as an alternative to dns providers; non-downloadable software for internet directory services, recursive domain name server (dns) services; non-downloadable software for threat detection, mitigation and resolution services; non-downloadable software for bot management, mitigation, protection and guarding; non-downloadable software for business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; consultation and technical consultation in the field of internet routing system services, dns resolver services and global dns resolution services, and related hardware and software; computer security services, a non-downloadable cloud-based firewall that monitors and filters dns queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; cloud-based dns resolution services; protecting online businesses from the effects of dns-based ddos attacks and other threats; identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, dns data exfiltration, and advanced zero-day attacks; non-downloadable software for threat detection, mitigation and resolution services; non-downloadable software for bot management, mitigation, protection and guarding; non-downloadable software for business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; consultation and technical consultation in the fields of api security, network security, computer security, firewalls, dns-based ddos attacks, malware, ransomware, phishing, dns data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services, global computer information network connectivity, telecommunications, and related hardware and software; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; non-downloadable software provided online for compiling and organizing statistical analysis of business functions; non-downloadable software provided online which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; data analytics, computer security threat analysis for protecting data; providing on-line, non-downloadable software for use in identification of ip addresses and ranking or scoring them according to their reputation; providing on-line, non-downloadable software for possible risk or fraud detection related to business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; information technology consulting and technical consultation regarding computer hardware and software for use in identifying ip addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (mrti) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; computer security threat analysis for protecting data; data automation and collection services using proprietary software to evaluate, analyze and collect data; internet protocol (ip) address verification services; providing online searchable databases featuring the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geo-fencing and digital rights management; cloud-based recursive dns service featuring temporary use of non-downloadable cloud based software for mapping and resolving the proper ip address to queried domain names to requesting hosts; cloud-based recursive dns service featuring temporary use of non-downloadable cloud-based software for computer security, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services namely, providing dns query resolutions between servers; electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; preventing access to malicious websites known for online data threats; blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; defending service from distributed denial of service (ddos) attacks; cleaning and filtering of malicious internet traffic; network and data security advisory services and assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions;.

Its status is currently believed to be active. Its class is unavailable. “VERCARA” is believed to be currently owned by “SECURITY SERVICES, LLC”.

Owner:
SECURITY SERVICES, LLC
Owner Details
Description:
COMPUTER HARDWARE AND DOWNLOADABLE SOFTWARE FOR USE IN ASSESSING, ANALYZING AND MAKING INFERENCES WITH RESPECT TO DETECTING, MITIGATING AND RESOLVING INTERNET TRAFFIC THREATS, ASSESSING INTELLIGENCE DATA, AND ANALYZING AND MAKING INFERENCES REGARDING END USER'S INTERNET TRAFFIC TO DETERMINE HOW SUCH TRAFFIC SHOULD BE HANDLED; DOWNLOADABLE SOFTWARE FOR USE IN PROVIDING STATISTICAL ANALYSIS OF BUSINESS FUNCTIONS; DOWNLOADABLE SOFTWARE FOR PROVIDING DEMOGRAPHIC INFORMATION AND DATA CONCERNING THE GEOGRAPHIC LOCATION OF INTERNET ACCESS DEVICES USED BY CONSUMERS, THE GEOGRAPHIC LOCATIONS OF CONSUMERS, THE CONNECTION SPEED AND METHOD BY WHICH CONSUMERS ARE ACCESSING THE INTERNET, AND THE SPECIFIC TYPES OF DEVICES USED BY CONSUMERS TO ACCESS THE INTERNET; DOWNLOADABLE SOFTWARE FOR PROVIDING ACCESS TO AND CREATING DATABASES FEATURING IT INFORMATION ABOUT INTERNET PROTOCOL ADDRESSES IN THE NATURE OF THE USER'S LOCATION, INTERNET SERVICE PROVIDER, ORGANIZATION, CONNECTION TYPE, USER TYPE AND OTHER DATA ASSOCIATED WITH SPECIFIC INTERNET PROTOCOL ADDRESSES; DOWNLOADABLE SOFTWARE FOR PROVIDING ACCESS TO TECHNOLOGY THAT ALLOWS USERS TO DETERMINE THE LOCATION, INTERNET SERVICE PROVIDER, ORGANIZATION, CONNECTION TYPE, USER TYPE, AND OTHER DATA ASSOCIATED WITH SPECIFIC INTERNET PROTOCOL ADDRESSES; DOWNLOADABLE SOFTWARE FOR PROVIDING (IP) ADDRESS VERIFICATION SERVICES; DOWNLOADABLE SOFTWARE FOR PROVIDING ACCESS TO AND CREATING DATABASES FEATURING THE LOCATION, INTERNET SERVICE PROVIDER AND ORGANIZATION ASSOCIATED WITH SPECIFIC INTERNET ADDRESSES; DOWNLOADABLE SOFTWARE FOR PROVIDING IDENTIFICATION OF WEBSITE VISITOR GEOGRAPHICAL LOCATION BY USING IP ADDRESS; DOWNLOADABLE SOFTWARE FOR PROVIDING IDENTIFICATION OF THE LOCATION AND OTHER CHARACTERISTICS OF INTERNET USERS FOR A WIDE RANGE OF APPLICATIONS INCLUDING CONTENT PERSONALIZATION, FRAUD DETECTION, AD TARGETING, TRAFFIC ANALYSIS, COMPLIANCE, GEO-TARGETING, GEOFENCING AND DIGITAL RIGHTS MANAGEMENT; DOWNLOADABLE SOFTWARE FOR PROVIDING INTERNET DIRECTORY SERVICES, RECURSIVE DOMAIN NAME SERVER (DNS) SERVICES; DOWNLOADABLE SOFTWARE FOR IDENTIFICATION AND TRACKING OF IP ADDRESSES AND RANKING OR SCORING THEM ACCORDING TO THEIR REPUTATION; DOWNLOADABLE SOFTWARE FOR USE IN DETECTING, MITIGATING AND RESOLVING INTERNET TRAFFIC THREATS AND FOR USE IN PROVIDING INTELLIGENCE DATA TO ASSESS, ANALYZE AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC, TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED; DOWNLOADABLE SOFTWARE FOR USE IN DETECTING, MITIGATING AND RESOLVING INTERNET TRAFFIC SECURITY THREATS; DOWNLOADABLE SOFTWARE FOR USE IN COMPILING COMPUTER SECURITY THREAT INTELLIGENCE DATA TO ASSESS, ANALYZE AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC AND TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED; DOWNLOADABLE SOFTWARE FOR PROVIDING MACHINE READABLE THREAT INTELLIGENCE (MRTI) INFORMATION AND DATA TO HELP DETERMINE IF INCOMING INTERNET TRAFFIC IS MALICIOUS AND TO DISCOVER ASSOCIATIONS AMONG THREAT ACTORS TO TRACK AND BLOCK THEIR ACTIVITY;PROVIDING MULTIPLE USER ACCESS TO GLOBAL COMPUTER INFORMATION NETWORKS FOR THE TRANSFER AND DISSEMINATION OF A WIDE RANGE OF INFORMATION; INTERNET INFRASTRUCTURE SERVICES; DOMAIN NAME SYSTEM MANAGEMENT SERVICES; DOMAIN NAME SYSTEM USAGE AND EFFICIENCY MONITORING AND REPORTING SERVICES; COMMUNICATION SERVICES, DIRECTING AND MANAGING OF INTERNET TRAFFIC;BUSINESS DATA ANALYSIS, USE OF THREAT INTELLIGENCE DATA TO ASSESS, ANALYZE AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC AND TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED;NON-DOWNLOADABLE COMPUTER SOFTWARE FOR SAFEGUARDING DIGITAL INFRASTRUCTURES AND ONLINE PRESENCES AND FOR PROTECTING NETWORKS AND APPLICATIONS AGAINST RISKS AND DOWNTIME; PROVIDING DNS, WEB APPLICATION, NETWORK SECURITY, DDOS, WEB APPLICATION FIREWALL (WAF), BOT MANAGEMENT, WEBSITE MONITORING AND WEBSITE LOAD TESTING SERVICES TO OTHERS; PROVIDING ON-LINE SEARCHABLE DATABASES FEATURING IT INFORMATION ABOUT INTERNET PROTOCOL ADDRESSES IN THE NATURE OF THE USER'S LOCATION, INTERNET SERVICE PROVIDER, ORGANIZATION, CONNECTION TYPE, USER TYPE AND OTHER DATA ASSOCIATED WITH SPECIFIC INTERNET PROTOCOL ADDRESSES; COMPUTER SERVICES, PROVIDING AN INTERACTIVE WEB SITE FEATURING TECHNOLOGY THAT ALLOWS USERS TO DETERMINE THE LOCATION, INTERNET SERVICE PROVIDER, ORGANIZATION, CONNECTION TYPE, USER TYPE, AND OTHER DATA ASSOCIATED WITH SPECIFIC INTERNET PROTOCOL ADDRESSES; INTERNET PROTOCOL (IP) ADDRESS VERIFICATION SERVICES; PROVIDING ONLINE SEARCHABLE DATABASES FEATURING THE LOCATION, INTERNET SERVICE PROVIDER AND ORGANIZATION ASSOCIATED WITH SPECIFIC INTERNET ADDRESSES; PROVIDING AN INTERACTIVE WEBSITE FEATURING TECHNOLOGY THAT ENABLES USER TO IDENTIFY THE GEOGRAPHICAL LOCATION OF WEBSITE VISITORS BY IP ADDRESS, FOR A WIDE RANGE OF APPLICATIONS INCLUDING, FRAUD DETECTION, COMPLIANCE, GEO-TARGETING, GEO-FENCING AND DIGITAL RIGHTS MANAGEMENT; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA BY PROVIDING USING THREAT ANALYSIS DATA TO ASSESS, ANALYZE AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC AND TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICE USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT SERVICE DATA; NON-DOWNLOADABLE SOFTWARE PROVIDED ONLINE FOR COMPILING AND ORGANIZING STATISTICAL ANALYSIS OF BUSINESS FUNCTIONS; NON-DOWNLOADABLE SOFTWARE PROVIDED ONLINE WHICH UTILIZES THREAT INTELLIGENCE DATA TO ASSESS AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC AND TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED; NETWORK SECURITY AND THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES, PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE CLOUD-BASED SOFTWARE FOR CLEANING, SCRUBBING AND FILTERING OF MALICIOUS INTERNET AND NETWORK TRAFFIC; ELECTRONIC MONITORING AND REPORTING OF SERVERS, NETWORKS, NETWORK SYSTEMS, NETWORK DATA, NETWORK INFORMATION, DATA PACKETS, AND INTERNET PROTOCOL TRAFFIC USING COMPUTERS FOR SECURITY PURPOSES AND PROVIDING RELATED REPORTS FEATURING SUSPICIOUS AND ABNORMAL PATTERNS AND ANOMALIES OF NETWORKS, SYSTEM ACTIVITY REPORTS, AND EVENT NOTIFICATION ALERTS; PROVIDING TEMPORARY USE ON NON-DOWNLOADABLE SOFTWARE FOR USE IN DETECTING, IDENTIFYING, INTERCEPTING, CAPTURING, QUARANTINING AND PREVENTING ONLINE THREATS; PROVIDING TEMPORARY USE OF ON-LINE NON-DOWNLOADABLE SOFTWARE FOR USE IN PREVENTING ACCESS TO MALICIOUS WEBSITES AND ONLINE THREATS; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE SOFTWARE FOR USE IN BLOCKING UNWANTED AND INAPPROPRIATE INTERNET AND NETWORK TRAFFIC, FOR MITIGATING AGAINST AND DEFENDING NETWORKS AND WEBSITES FROM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS AND IMPLEMENTATION OF COUNTERMEASURES TO LIMIT EXPOSURE FROM SUCH ATTACKS AND PROTECT A WEBSITE'S UPTIME; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE SOFTWARE FOR USE IN PROVIDING BOT MANAGEMENT, MITIGATION, PROTECTION AND GUARDING AGAINST ONLINE AND SOFTWARE THREATS; COMPUTER SECURITY SERVICES, A PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE CLOUD-BASED FIREWALL SOFTWARE THAT MONITORS AND FILTERS DNS QUERIES TO PREVENT AND BLOCK COMPUTER NETWORK USERS FROM ACCESSING UNWANTED AND INAPPROPRIATE CONTENT AND FROM ACCESSING CUSTOM-DESIGNATED THIRD-PARTY WEBSITES OR PREVENTING ACCESS TO MALICIOUS WEBSITES OR ONLINE THREATS; PROVIDING TEMPORARY USE OF CLOUD-BASED COMPUTER SOFTWARE FOR DOMAIN NAME SYSTEM (DNS RESOLUTION SERVICES); COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA BY PROTECTING ONLINE BUSINESSES FROM THE EFFECTS OF DNS-BASED DDOS ATTACKS AND OTHER THREATS; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA THROUGH IDENTIFICATION, BLOCKING AND MITIGATING TARGETED ONLINE THREATS SUCH AS MALWARE, RANSOM WARE, PHISHING, DNS DATA EXFILTRATION, AND ADVANCED ZERO-DAY ATTACKS; PROVIDING TEMPORARY USE OF ON-LINE NON-DOWNLOADABLE WEBSITE SOFTWARE APPLICATION AND API SECURITY AND THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES, A WEB APPLICATION FIREWALL (WAF) THAT CLEANS, SCRUBS AND FILTERS MALICIOUS ATTACKS AGAINST WEBSITE SOFTWARE APPLICATIONS AND APPLICATION PROGRAMMING INTERFACE (API'S); ELECTRONIC MONITORING OF WEBSITE SOFTWARE APPLICATIONS AND API'S FOR SECURITY PURPOSES AND PROVIDING RELATED REPORTS FEATURING SUSPICIOUS AND ABNORMAL PATTERNS, ANOMALIES AND ACTIVITIES; PROVIDING TEMPORARY USE OF ONLINE DOWNLOADABLE SOFTWARE FOR USE IN DETECTING, IDENTIFYING, INTERCEPTING, CAPTURING, QUARANTINING AND PREVENTING THREATS TO WEBSITE SOFTWARE APPLICATIONS AND API'S; COMPUTER SECURITY SERVICES, PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE SOFTWARE FOR USE RESTRICTING UNAUTHORIZED NETWORK ACCESS BY PREVENTING ACCESS TO MALICIOUS WEBSITES AND ONLINE THREATS, BLOCKING UNWANTED AND INAPPROPRIATE INTERACTIONS WITH WEBSITE SOFTWARE APPLICATIONS AND API'S, MITIGATING AGAINST AND DEFENDING ATTACKS AGAINST WEBSITE SOFTWARE APPLICATIONS AND API'S AND IMPLEMENTATION OF COUNTERMEASURES TO LIMIT EXPOSURE FROM SUCH ATTACKS AND PROTECT A WEBSITE'S UPTIME; DNS RESOLVER SERVICES THAT MAKE DNS QUERIES FASTER AND MORE SECURE FOR FASTER AND MORE PRIVATE BROWSING OF THE INTERNET, PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR USE IN SECURING AND SPEEDING INTERNET BROWSING CAPACITY; GLOBAL DNS RESOLUTION SERVICE, COMPUTER CODE CONVERSION FOR OTHERS; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE IN PROVIDING AN INTERNET DIRECTORY COMPRISING RECURSIVE DOMAIN NAME SERVER (DNS) SERVICES; NON-DOWNLOADABLE SOFTWARE FOR USE IN CONNECTING TO THE INTERNET WHICH PROVIDES A WIDE RANGE OF FUNCTIONALITY, INCLUDING PROVIDING CONNECTIVITY IN THE SHORTEST TIME POSSIBLE, DETERMINING THE MOST DIRECT ROUTE OF CONNECTIVITY, ROUTING AROUND INACTIVE MACHINES, AND ROUTING AROUND INACTIVE LINES; PROVIDING NETWORK SECURITY AND THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES, PROVIDING TEMPORARY USE OF CLOUD-BASED SOFTWARE FOR CLEANING, SCRUBBING AND FILTERING OF MALICIOUS INTERNET AND NETWORK TRAFFIC; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE SOFTWARE FOR USE IN PROVIDING ELECTRONIC MONITORING OF SERVERS, NETWORKS, NETWORK SYSTEMS, NETWORK DATA, NETWORK INFORMATION, DATA PACKETS, AND INTERNET PROTOCOL TRAFFIC FOR SECURITY PURPOSES AND PROVIDING RELATED REPORTS FEATURING SUSPICIOUS AND ABNORMAL PATTERNS AND ANOMALIES OF NETWORKS, SYSTEM ACTIVITY REPORTS, AND EVENT NOTIFICATION ALERTS; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE SOFTWARE FOR USE IN DETECTING, IDENTIFYING, INTERCEPTING, CAPTURING, QUARANTINING AND PREVENTING ONLINE THREATS, AND FOR USE IN PREVENTING ACCESS TO MALICIOUS WEBSITES AND ONLINE THREATS; COMPUTER SECURITY SERVICES, RESTRICTING UNAUTHORIZED NETWORK ACCESS BY BLOCKING UNWANTED AND INAPPROPRIATE INTERNET AND NETWORK TRAFFIC, BY MITIGATING AGAINST AND DEFENDING NETWORKS AND WEBSITES FROM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS AND IMPLEMENTATION OF COUNTERMEASURES TO LIMIT EXPOSURE FROM SUCH ATTACKS AND PROTECT A WEBSITE'S UPTIME; PROVIDING ON-LINE NON-DOWNLOADABLE SOFTWARE FOR USE IN PROVIDING THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES; PROVIDING ON-LINE NON-DOWNLOADABLE SOFTWARE FOR USE IN PROVIDING BOT MANAGEMENT AND MITIGATION, PROTECTION AND GUARDING AGAINST NETWORK SECURITY THREATS; CONSULTATION AND TECHNICAL CONSULTATION IN THE FIELDS OF NETWORK SECURITY, COMPUTER SECURITY, FIREWALLS, DNS-BASED DDOS ATTACKS, MALWARE, RANSOMWARE, PHISHING, DNS DATA EXFILTRATION, ADVANCED ZERODAY ATTACKS, AND THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES; CONSULTING SERVICES IN THE FIELDS OF SELECTION, IMPLEMENTATION AND USE OF COMPUTER HARDWARE AND SOFTWARE SYSTEMS FOR OTHERS WITH REGARDS TO NETWORK SECURITY, COMPUTER SECURITY, FIREWALLS, DNS-BASED DDOS ATTACKS, MALWARE, RANSOMWARE, PHISHING, DNS DATA EXFILTRATION, ADVANCED ZERO-DAY ATTACKS, AND THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES; CONSULTATION AND TECHNICAL CONSULTATION IN THE FIELD OF GLOBAL COMPUTER INFORMATION NETWORK CONNECTIVITY AND TELECOMMUNICATION HARDWARE AND SOFTWARE; INTERNET ROUTING SYSTEM SERVICES; DOMAIN NAME SERVER (DNS) RESOLVER SERVICES THAT MAKE DNS QUERIES FASTER AND MORE SECURE FOR FASTER AND MORE PRIVATE BROWSING OF THE INTERNET; GLOBAL DNS RESOLUTION SERVICE AS AN ALTERNATIVE TO DNS PROVIDERS; NON-DOWNLOADABLE COMPUTER SOFTWARE FOR USE IN CONNECTING TO THE INTERNET WHICH PROVIDES A WIDE RANGE OF FUNCTIONALITY, INCLUDING PROVIDING CONNECTIVITY IN THE SHORTEST TIME POSSIBLE, DETERMINING THE MOST DIRECT ROUTE OF CONNECTIVITY, ROUTING AROUND INACTIVE MACHINES, AND ROUTING AROUND INACTIVE LINES; NON-DOWNLOADABLE COMPUTER SOFTWARE FOR THE DIRECTING AND MANAGING OF INTERNET TRAFFIC; NON-DOWNLOADABLE COMPUTER SOFTWARE FOR USE IN A WIDE RANGE OF TRANSACTIONS AND TELECOMMUNICATIONS OVER THE GLOBAL COMPUTER INFORMATION NETWORK; NON-DOWNLOADABLE SOFTWARE FOR INTERNET DIRECTORY SERVICES, RECURSIVE DNS SERVICES; NON-DOWNLOADABLE SOFTWARE FOR THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES; NON-DOWNLOADABLE SOFTWARE FOR BOT MANAGEMENT, MITIGATION, PROTECTION AND GUARDING; NON-DOWNLOADABLE SOFTWARE FOR BUSINESS INFORMATION SERVICES, DATA ANALYTICS, DATABASES AND INFORMATION FOR BUSINESS; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICES USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT DATA; CONSULTATION AND TECHNICAL CONSULTATION IN THE FIELD OF INTERNET ROUTING SYSTEM SERVICES, DNS RESOLVER SERVICES AND GLOBAL DNS RESOLUTION SERVICES, AND RELATED HARDWARE AND SOFTWARE; PROVIDING TEMPORARY USE OF A NON-DOWNLOADABLE WEB APPLICATION FIREWALL (WAF) SOFTWARE THAT CLEANS, SCRUBS AND FILTERS MALICIOUS ATTACKS AGAINST WEBSITE SOFTWARE APPLICATIONS AND APPLICATION PROGRAMMING INTERFACE (API) SOFTWARE; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE ELECTRONIC MONITORING OF WEBSITE SOFTWARE APPLICATIONS AND API'S FOR SECURITY PURPOSES AND PROVIDING RELATED REPORTS FEATURING SUSPICIOUS AND ABNORMAL PATTERNS, ANOMALIES AND ACTIVITIES, AND DETECTING, IDENTIFYING, INTERCEPTING, CAPTURING, QUARANTINING AND PREVENTING THREATS TO WEBSITE SOFTWARE APPLICATIONS AND API'S; COMPUTER SECURITY SERVICES, RESTRICTING UNAUTHORIZED NETWORK ACCESS BY PREVENTING ACCESS TO MALICIOUS WEBSITES AND ONLINE THREATS, BLOCKING UNWANTED AND INAPPROPRIATE INTERACTIONS WITH WEBSITE SOFTWARE APPLICATIONS AND API'S, MITIGATING AGAINST AND DEFENDING ATTACKS AGAINST WEBSITE SOFTWARE APPLICATIONS AND API'S AND IMPLEMENTATION OF COUNTERMEASURES TO LIMIT EXPOSURE FROM SUCH ATTACKS AND PROTECT A WEBSITE'S UPTIME, AND BOT MANAGEMENT, MITIGATION, PROTECTION AND GUARDING; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR THREAT DETECTION, MITIGATION AND RESOLUTION; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE IN PROVIDING BOT MANAGEMENT, MITIGATION, PROTECTION AND GUARDING; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICES USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT DATA; CONSULTATION AND TECHNICAL CONSULTATION IN THE FIELDS OF API SECURITY, NETWORK SECURITY, COMPUTER SECURITY, FIREWALLS, DNS-BASED DDOS ATTACKS, MALWARE, RANSOMWARE, PHISHING, DNS DATA EXFILTRATION, ADVANCED ZERO-DAY ATTACKS, THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES, CONSULTING SERVICES IN THE FIELDS OF SELECTION, IMPLEMENTATION AND USE OF COMPUTER HARDWARE AND SOFTWARE SYSTEMS FOR OTHERS WITH REGARDS TO NETWORK SECURITY, COMPUTER SECURITY, FIREWALLS, DNS-BASED DDOS ATTACKS, MALWARE, RANSOMWARE, PHISHING, DNS DATA EXFILTRATION, ADVANCED ZERO-DAY ATTACKS, AND THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES; INTERNET ROUTING SYSTEM SERVICES; DNS RESOLVER SERVICES THAT MAKE DNS QUERIES FASTER AND MORE SECURE FOR FASTER AND MORE PRIVATE BROWSING OF THE INTERNET; GLOBAL DNS RESOLUTION SERVICE AS AN ALTERNATIVE TO DNS PROVIDERS; NON-DOWNLOADABLE SOFTWARE FOR INTERNET DIRECTORY SERVICES, RECURSIVE DOMAIN NAME SERVER (DNS) SERVICES; NON-DOWNLOADABLE SOFTWARE FOR THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES; NON-DOWNLOADABLE SOFTWARE FOR BOT MANAGEMENT, MITIGATION, PROTECTION AND GUARDING; NON-DOWNLOADABLE SOFTWARE FOR BUSINESS INFORMATION SERVICES, DATA ANALYTICS, DATABASES AND INFORMATION FOR BUSINESS; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICES USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT DATA; CONSULTATION AND TECHNICAL CONSULTATION IN THE FIELD OF INTERNET ROUTING SYSTEM SERVICES, DNS RESOLVER SERVICES AND GLOBAL DNS RESOLUTION SERVICES, AND RELATED HARDWARE AND SOFTWARE; COMPUTER SECURITY SERVICES, A NON-DOWNLOADABLE CLOUD-BASED FIREWALL THAT MONITORS AND FILTERS DNS QUERIES TO PREVENT AND BLOCK COMPUTER NETWORK USERS FROM ACCESSING UNWANTED AND INAPPROPRIATE CONTENT AND FROM ACCESSING CUSTOM-DESIGNATED THIRD-PARTY WEBSITES OR PREVENTING ACCESS TO MALICIOUS WEBSITES OR ONLINE THREATS; CLOUD-BASED DNS RESOLUTION SERVICES; PROTECTING ONLINE BUSINESSES FROM THE EFFECTS OF DNS-BASED DDOS ATTACKS AND OTHER THREATS; IDENTIFICATION, BLOCKING AND MITIGATING TARGETED ONLINE THREATS SUCH AS MALWARE, RANSOMWARE, PHISHING, DNS DATA EXFILTRATION, AND ADVANCED ZERO-DAY ATTACKS; NON-DOWNLOADABLE SOFTWARE FOR THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES; NON-DOWNLOADABLE SOFTWARE FOR BOT MANAGEMENT, MITIGATION, PROTECTION AND GUARDING; NON-DOWNLOADABLE SOFTWARE FOR BUSINESS INFORMATION SERVICES, DATA ANALYTICS, DATABASES AND INFORMATION FOR BUSINESS; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICES USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT DATA; CONSULTATION AND TECHNICAL CONSULTATION IN THE FIELDS OF API SECURITY, NETWORK SECURITY, COMPUTER SECURITY, FIREWALLS, DNS-BASED DDOS ATTACKS, MALWARE, RANSOMWARE, PHISHING, DNS DATA EXFILTRATION, ADVANCED ZERO-DAY ATTACKS, THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES, GLOBAL COMPUTER INFORMATION NETWORK CONNECTIVITY, TELECOMMUNICATIONS, AND RELATED HARDWARE AND SOFTWARE; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICE USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT SERVICE DATA; NON-DOWNLOADABLE SOFTWARE PROVIDED ONLINE FOR COMPILING AND ORGANIZING STATISTICAL ANALYSIS OF BUSINESS FUNCTIONS; NON-DOWNLOADABLE SOFTWARE PROVIDED ONLINE WHICH UTILIZES THREAT INTELLIGENCE DATA TO ASSESS AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC AND TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED; DATA ANALYTICS, COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; PROVIDING ON-LINE, NON-DOWNLOADABLE SOFTWARE FOR USE IN IDENTIFICATION OF IP ADDRESSES AND RANKING OR SCORING THEM ACCORDING TO THEIR REPUTATION; PROVIDING ON-LINE, NON-DOWNLOADABLE SOFTWARE FOR POSSIBLE RISK OR FRAUD DETECTION RELATED TO BUSINESS INFORMATION SERVICES, DATA ANALYTICS, DATABASES AND INFORMATION FOR BUSINESS; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICES USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT DATA; INFORMATION TECHNOLOGY CONSULTING AND TECHNICAL CONSULTATION REGARDING COMPUTER HARDWARE AND SOFTWARE FOR USE IN IDENTIFYING IP ADDRESSES AND RANKING OR SCORING THEM ACCORDING TO THEIR REPUTATION RELATED TO POSSIBLE RISK OR FRAUD; DATA ANALYTICS, COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA BY USING THREAT INTELLIGENCE DATA TO ASSESS, ANALYZE AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC AND TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR USE OF THREAT INTELLIGENCE DATA TO ASSESS, ANALYZE AND MAKE INFERENCES REGARDING AN END USER'S INTERNET TRAFFIC AND TO MAKE DETERMINATIONS AS TO HOW SUCH TRAFFIC SHOULD BE HANDLED; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR PROVIDING MACHINE READABLE THREAT INTELLIGENCE (MRTI) INFORMATION AND DATA TO HELP DETERMINE IF INCOMING INTERNET TRAFFIC IS MALICIOUS AND TO DISCOVER ASSOCIATIONS AMONG THREAT ACTORS TO TRACK AND BLOCK THEIR ACTIVITY; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR THREAT DETECTION, MITIGATION AND RESOLUTION SERVICES RELATED TO INTERNET TRAFFIC; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE SOFTWARE FOR BOT MANAGEMENT, MITIGATION, PROTECTION AND GUARDING; COMPUTER SECURITY THREAT ANALYSIS FOR PROTECTING DATA; DATA AUTOMATION AND COLLECTION SERVICES USING PROPRIETARY SOFTWARE TO EVALUATE, ANALYZE AND COLLECT DATA; INTERNET PROTOCOL (IP) ADDRESS VERIFICATION SERVICES; PROVIDING ONLINE SEARCHABLE DATABASES FEATURING THE LOCATION ASSOCIATED WITH SPECIFIC INTERNET ADDRESSES FOR A WIDE RANGE OF APPLICATIONS INCLUDING FRAUD DETECTION, COMPLIANCE, GEO-FENCING AND DIGITAL RIGHTS MANAGEMENT; CLOUD-BASED RECURSIVE DNS SERVICE FEATURING TEMPORARY USE OF NON-DOWNLOADABLE CLOUD BASED SOFTWARE FOR MAPPING AND RESOLVING THE PROPER IP ADDRESS TO QUERIED DOMAIN NAMES TO REQUESTING HOSTS; CLOUD-BASED RECURSIVE DNS SERVICE FEATURING TEMPORARY USE OF NON-DOWNLOADABLE CLOUD-BASED SOFTWARE FOR COMPUTER SECURITY, BLOCKING, ALLOWING, ROUTING AND RESOLUTION OF QUERIES OF PROTECTED DATA AND ONLINE SERVICES VIA CONNECTING AND RESOLVING USERS OF THE SOFTWARE TO MOBILE DEVICES, COMPUTERS, TELEVISION, TELEPHONE AND THE INTERNET AND WIRELESS ENABLED DEVICES AND PROTECTING THE NETWORKS OF OTHERS FROM INCOMING SECURITY THREATS; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE CLOUD-BASED SOFTWARE FOR PROTECTING DATA BY RESTRICTING ACCESS TO NON-COMPLIANT CONTENT AND WEBSITES WITH KNOWN VULNERABILITIES; NETWORK SECURITY AND THREAT INTELLIGENCE SERVICES NAMELY, PROVIDING DNS QUERY RESOLUTIONS BETWEEN SERVERS; ELECTRONIC MONITORING OF SERVERS, NETWORKS, NETWORK SYSTEMS, NETWORK DATA, NETWORK INFORMATION, DATA PACKETS, AND INTERNET PROTOCOL TRAFFIC FOR SECURITY PURPOSES AND PROVIDING RELATED REPORTS FEATURING SUSPICIOUS AND ABNORMAL PATTERNS OF NETWORKS, SYSTEM ACTIVITY REPORTS, AND EVENT NOTIFICATION ALERTS; DETECTING, IDENTIFYING, INTERCEPTING, CAPTURING, QUARANTINING AND PREVENTING ONLINE COMPUTER DATA THREATS; PREVENTING ACCESS TO MALICIOUS WEBSITES KNOWN FOR ONLINE DATA THREATS; BLOCKING UNWANTED AND INAPPROPRIATE CONTENT WITH THE USE OF PRE-DEFINED CATEGORY-BASED WEB FILTERING AND CUSTOM WHITE/BLACK LISTS; DEFENDING SERVICE FROM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS; CLEANING AND FILTERING OF MALICIOUS INTERNET TRAFFIC; NETWORK AND DATA SECURITY ADVISORY SERVICES AND ASSESSING FOR OTHERS THE VULNERABILITY OF ONLINE SYSTEMS, AND PRESCRIBING FOR OTHER FIXES FOR WEAKNESSES AND GAUGES FOR PERFORMANCE FOR PROTECTION AGAINST CYBER THREATS AND INTERRUPTIONS;
Categories: COMPUTER HARDWARE DOWNLOADABLE SOFTWARE