Computer hardware and recorded and downloadable software systems for use in network security, monitoring and optimization; recorded and downloadable computer programs for connecting remotely to computers or computer networks; recorded and downloadable computer programs for use in network security, monitoring and optimization; recorded and downloadable computer software and hardware for use in network security, monitoring and optimization; recorded and downloadable computer software for the creation of firewalls; recorded and downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded and downloadable computer software for use in network security, monitoring and optimization; downloadable computer software for use in network security, monitoring and optimization that may be downloaded from a global computer network; recorded and downloadable computer software platforms for use in network security, monitoring and optimization; computers for network management; electronic software updates, namely, downloadable computer software and associated downloadable electronic data files for updating computer software in the fields of use in network security, monitoring and optimization, provided via computer and communication networks
Electrical and Scientific ApparatusComputer services, namely, creating website-based indexes of information, websites and other resources available on computer networks; computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; computer services, namely, providing search engines for obtaining data on a global computer network; computer virus protection services; consulting services regarding computer security; cloud based computer application and network enterprise security services to detect and mitigate distributed denial of service (DDoS) attacks, cyber risks, threats and vulnerabilities, scanning and preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable cloud-based software for use in monitoring computer network security; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of distributed denial of service (DDoS) detection; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of advance threat protection; providing on-line non-downloadable operating software for accessing data, analytics, and presentation of information; software as a service (SAAS) services featuring software for gathering, displaying and analyzing data from networks and enterprises; computer software development and computer programming development for others; development, updating and maintenance of computer software; technical support services, namely, troubleshooting of computer software problems; ; cloud based computer network security services, namely, monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (DDoS) attacks on computer servers connected to the internet
Computer and Scientific