87059270
Jun 3, 2016
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions
Electrical and Scientific ApparatusComputer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Computer and Scientific