Downloadable computer software for monitoring networks, electronic mail, and devices for malware and cyber-attacks; Downloadable software for monitoring networks, electronic mail, and devices for malware and cyber-attacks; Computer hardware, namely, firewalls; Computer hardware for electronic security; Downloadable software for utility purposes, namely, optimizing and securing computer systems, operational technology, and informational technology, including threat prevention, traffic filtering, antivirus protection, file management, and disk optimization tasks; Downloadable software for security purposes including antivirus scanners, firewalls including AI-based firewalls, adaptive intrusion detection systems, threat intelligence, encryption communications, and threat prevention systems; Downloadable software for cryptography, namely, encrypting digital information; Downloadable computer utility programs for performing computer maintenance; Recorded computer utility programs for performing computer maintenance
Electrical and Scientific ApparatusInformation technology consulting relating to computer software design; Computer security consultancy in the field of data security, internet security, security systems, and electronic data security; Data security consultancy; Internet security consultancy; Computer programming services, namely, programming of computer security risk management programs, Internet security programs, and electronic data security; Computer security consultancy in the field of computer security and data security; Monitoring of computer systems for detecting unauthorized access or data breach; Telecommunication network security consultancy; Maintenance of computer software; Computer software development, computer programming and maintenance of computer software for internet security programs and electronic data security systems; Updating of computer software; Rental of software for internet security programs; Computer security threat analysis for protecting data; Computer services, namely, data recovery services; Recovery of smartphone data; Recovery of computer data; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions
Computer and Scientific