GS0091 | computer software and computer hardware for testing and evaluating computers, computer networks and information technology systems for security vulnerability and risk relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for cyber-security, cyber-defense, information security and assurance, data security, computer security, network security and prevention of hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for monitoring, detecting, inspecting, processing, analyzing, mitigating and remediating computers, computer networks and information technology systems for hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for risk mitigation and remediation, integrity and threat analysis, cyber event data analysis, digital data intelligence gathering and analysis and dispatch of security countermeasures relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for data warehousing, data analysis, threat detection, measurement and evaluation of security process effectiveness and security management controls relating to computer security, network security and information technology systems security; computer software for security information and event management and defense against hacking, cyber-attacks, computer crimes and computer viruses, namely, monitoring computer, network and information technology system activity and identifying, investigating and responding to information security threats; computer programs for collecting, storing and managing network/enterprise log records and call detail record retention and retrieval relating to computer and network security; computer network security products, namely, computer and network hardware and software for use in computer network security, monitoring, analysis, assessment and intrusion detection; computer software and hardware for cyber attack prevention, network security threat management, intrusion detection and prevention; computer and network software and hardware for monitoring of network infrastructure and network activity, detecting, analyzing and providing assessment and countermeasures against computer viruses, cyber attacks, hacking, computer crimes and invasion of intruders into computer networks; computer programs for network management and security, network packet capture, network monitoring, network traffic characterization and network intrusion detection and tracing the origin of network traffic geolocation information, and using single or multiple processors; computer software and hardware for network management and security, network packet capture, network monitoring, network traffic characterization and network intrusion detection and tracing the origin of network traffic geolocation information, and using single or multiple processors; computer software for administration of computer networks; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; telecommunications and data networking hardware, namely, devices for transporting and aggregating voice, data, and video communications across multiple network infrastructures and communications protocols; computer software for network monitoring and forensics analysis, data replication for multiple applications to simultaneously analyze a data stream, time stamping, and for acquiring, recording, analyzing, filtering, modifying, sending and storing data while sending real-time statistics to monitoring applications; software and hardware for use in improving operational system management by identifying cyber assets and configurations, and in monitoring, viewing and identifying cyber security events and system vulnerabilities, and in streamlining compliance data collection and analysis for report generation and system wide change management, and in creating custom dashboards of compliance related activities for system wide visibility, and in compliance document management; electrical and scientific apparatus, namely, high resolution electro-optical airborne digital cameras; airborne platforms, namely, mounting devices adapted for mounting cameras on aircraft and unmanned aerial vehicles; airborne platforms, namely, mounting devices adapted for mounting sensor systems comprised of electro-optic, laser, radar, radiometric, acoustic, thermal, multi-spectral and hyper-spectral sensors on aircraft and unmanned aerial vehicles; airborne sensor systems comprised primarily of electro-optic, laser, radar, radiometric, acoustic, thermal, multi-spectral and hyper-spectral sensors; and high-resolution aerial imaging systems comprised primarily of high resolution electro-optical cameras, synthetic aperture radar systems, laser radar, lidar, bolometric and thermal imaging systems, spectral imagers, geoprocessors and geoprocessing software; radar systems consisting of radar apparatus and computer hardware and software for the control and operation of radar systems and the processing of radar data; sensor systems consisting of sensors and computer hardware and software for the control and operation of sensor systems and the processing of sensor data; geographic imagery downloadable over a global computer network; signal processing systems and electro-optical, lidar, radio frequency, radar, sensor and other devices, apparatus and technologies for gathering intelligence and geospatial intelligence data and information; portable, automated electronic surveillance system comprised of hardware and software applications to extract, process, assess and analyze data, content and information from digital devices and media for evidence and intelligence purposes; hardware and software systems for tracking and communications; computer software for data and metadata management and risk management; software to collect, filter, organize and securely store data from a wide variety of sources, including internal networks, external networks and open-source data from the Internet, to provide a user with readily available data that is relevant to a particular topic, area of interest or project; computer software for big data analysis and management; computer software for use in data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, data analytics and iterative development; computer software for cloud access, cloud storage and cloud computing; computer software development tools; computer software for computer system and application development, deployment and management; computer software that allows an operator, mission manager, or analysts to drive offensive or defensive cyber operations; end-to-end cyber mission platform comprised of hardware and software designed to deploy offensive and defensive cyberspace capabilities as a unified platform, including an immersive frontend for total cyberspace situational awareness for the operator, analyst and mission commander that unifies disparate cyberspace capabilities and provides a common interface to cyberspace data for analytics and data processing; software solution for local and distance learning environments on desktops, tablets and other mobile devices for training and education in the fields of information technology security, cyber-security, computer security, network security and data security; software and hardware solutions for collecting, processing, analyzing, filtering, indexing, searching, managing, storing, disseminating and providing reports on data and information from cyberspace and geospace for military, government and commercial purposes |