GS0091: Downloadable computer software for managing access control settings for Information Technology infrastructure; downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable computer software for adaptive risk-based decision making; downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; downloadable computer software for implementing least privilege access across computer networks network and cloud environments; downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources; downloadable computer manuals for use in connection with downloadable computer software for managing access control settings for Information Technology infrastructure, downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity, downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, downloadable computer software for implementing least privilege access across computer networks network and cloud environments, downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, and downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources
D10000: "CLOUD ENTITLEMENTS MANAGER"
GS0421: Software as a service (SAAS) services featuring software for managing access control settings for Information Technology infrastructure; software as a service (SAAS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making; software as a service (SAAS) services featuring software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; software as a service (SAAS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SAAS) services featuring software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; software as a service (SAAS) services featuring software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; software as a service (SAAS) services featuring software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; software as a service (SAAS) services featuring software for implementing least privilege access across computer networks network and cloud environments; software as a service (SAAS) services featuring software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; software as a service (SAAS) services featuring software for integrating with privileged access management solutions and for securing computer networks and cloud resources
Case File Event Statements
6/7/2022 - 3 years ago
28 - NOTICE OF REGISTRATION CONFIRMATION EMAILEDType:NRCC
6/7/2022 - 3 years ago
27 - REGISTERED-PRINCIPAL REGISTERType:R.PR
3/22/2022 - 3 years ago
26 - OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILEDType:NPUB
3/22/2022 - 3 years ago
25 - PUBLISHED FOR OPPOSITIONType:PUBO
3/2/2022 - 3 years ago
24 - NOTIFICATION OF NOTICE OF PUBLICATION E-MAILEDType:NONP
2/17/2022 - 3 years ago
23 - APPROVED FOR PUB - PRINCIPAL REGISTERType:CNSA
1/25/2022 - 3 years ago
22 - TEAS/EMAIL CORRESPONDENCE ENTEREDType:TEME
1/25/2022 - 3 years ago
21 - CORRESPONDENCE RECEIVED IN LAW OFFICEType:CRFA
1/25/2022 - 3 years ago
20 - TEAS REQUEST FOR RECONSIDERATION RECEIVEDType:ERFR
1/7/2022 - 3 years ago
19 - NOTIFICATION OF FINAL REFUSAL EMAILEDType:GNFN
1/7/2022 - 3 years ago
18 - FINAL REFUSAL E-MAILEDType:GNFR
1/7/2022 - 3 years ago
17 - FINAL REFUSAL WRITTENType:CNFR
11/4/2021 - 4 years ago
16 - TEAS/EMAIL CORRESPONDENCE ENTEREDType:TEME
11/4/2021 - 4 years ago
15 - CORRESPONDENCE RECEIVED IN LAW OFFICEType:CRFA
11/3/2021 - 4 years ago
14 - ASSIGNED TO LIEType:ALIE
11/1/2021 - 4 years ago
13 - TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVEDType:ERSI
8/13/2021 - 4 years ago
12 - NOTIFICATION OF LETTER OF SUSPENSION E-MAILEDType:GNS3
8/13/2021 - 4 years ago
11 - LETTER OF SUSPENSION E-MAILEDType:GNSL
8/13/2021 - 4 years ago
10 - SUSPENSION LETTER WRITTENType:CNSL
7/12/2021 - 4 years ago
9 - TEAS/EMAIL CORRESPONDENCE ENTEREDType:TEME
7/12/2021 - 4 years ago
8 - CORRESPONDENCE RECEIVED IN LAW OFFICEType:CRFA
7/12/2021 - 4 years ago
7 - TEAS RESPONSE TO OFFICE ACTION RECEIVEDType:TROA
4/26/2021 - 4 years ago
6 - NOTIFICATION OF NON-FINAL ACTION E-MAILEDType:GNRN
4/26/2021 - 4 years ago
5 - NON-FINAL ACTION E-MAILEDType:GNRT
4/26/2021 - 4 years ago
4 - NON-FINAL ACTION WRITTENType:CNRT
4/13/2021 - 4 years ago
3 - ASSIGNED TO EXAMINERType:DOCK
1/5/2021 - 4 years ago
2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAMType:NWOS