9 Recorded computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; recorded computer software for detecting fraudulent transactions and activities; recorded computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; recorded computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; recorded computer software for use in analyzing and monitoring computer networks; recorded computer software for diagnosing industrial and business performance issues; recorded computer software in the field of application analytics; recorded computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; data mining software; downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable computer software for detecting fraudulent transactions and activities; downloadable computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable computer software for use in analyzing and monitoring computer networks; downloadable computer software for diagnosing industrial and business performance issues; downloadable computer software in the field of application analytics; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; data mining software