Computer software and hardware for data security software modules; Computer software encryption; Computer software for use in the encryption and decryption, and generation and examination of digital signatures and message authentication codes, including audio, video, text, binary codes/files, images, graphics and multimedia files; Computer software for data security programs; Computer software for data security, which can be downloaded from a global computer network; Computer software for ensuring the security of computer programs; Computer software for secure updates of the system; Computer software for ensuring user authentication and key management
Electrical and Scientific ApparatusComputer virus protection services; Application service provider (ASP); Data security services; Development of computer software for security management; Design and development of Internet security programs; Computer security system monitoring services; Software as a service (SaaS); Computer virus protection services; Software as a service for use in network security and for assuring, managing, and maintaining the integrity of computer hardware, servers, networks, applications, data, and databases for the analysis and filtering of network traffic; Software as a service for the detection and removal of computer intrusions, viruses, and other malicious applications or threats on or to networks, computers, servers, mobile phones and personal data assistants; Software as a service for securing internet protocol; Providing computer software for antivirus, anti-spam, anti-spyware, anti-malware, anti-worm, anti-Trojan, VPN (virtual private network) access security, intrusion prevention, web filtering, security, and firewall protection; Software as a service for monitoring, logging, aggregating, collecting, analyzing and reporting of network information, data and traffic to optimize network efficiency, security and integrity; Design and development of computer software for fail-open network protection; Software as a service for the management, monitoring and reporting of network firewalls and security systems; Providing computer software for the response and secure updates of the system; Computer services for use in user authentication and digital key management
Computer and Scientific