97123081
Nov 12, 2021
Downloadable computer programs for analyzing whether local area networks have been breached; Downloadable computer programs for collecting and filtering networking behavior records of computers; Downloadable computer programs for detecting malware infection; Downloadable computer programs for monitoring computer networking behaviors; Downloadable software for analyzing and detecting attacker invasion; Downloadable software for analyzing whether computer systems have been breached; Downloadable software for analyzing whether local area networks have been breached; Downloadable software for collecting and filtering networking behavior records of computers; Downloadable software for detecting malware infection; Downloadable software for monitoring computer networking behaviors; Downloadable software platforms for analyzing and detecting attacker invasion; Downloadable software platforms for analyzing whether computer systems have been breached; Downloadable software platforms for analyzing whether local area networks have been breached; Downloadable software platforms for collecting and filtering networking behavior records of computers; Downloadable software platforms for detecting malware infection; Downloadable software platforms for monitoring computer networking behaviors; Recorded computer operating programs; Recorded computer programs for analyzing and detecting attacker invasion; Recorded computer programs for analyzing whether computer systems have been breached; Recorded computer programs for analyzing whether local area networks have been breached; Recorded computer programs for collecting and filtering networking behavior records of computers; Recorded computer programs for detecting malware infection; Recorded computer programs for monitoring computer networking behaviors; Recorded software for analyzing and detecting attacker invasion; Recorded software for analyzing whether computer systems have been breached; Recorded software for analyzing whether local area networks have been breached; Recorded software for collecting and filtering networking behavior records of computers; Recorded software for detecting malware infection; Recorded software for monitoring computer networking behaviors; Recorded software platforms for analyzing and detecting attacker invasion; Recorded software platforms for analyzing whether computer systems have been breached; Recorded software platforms for analyzing whether local area networks have been breached; Recorded software platforms for collecting and filtering networking behavior records of computers; Recorded software platforms for detecting malware infection; Recorded software platforms for monitoring computer networking behaviors
Electrical and Scientific ApparatusComputer services, namely, integration of private and public cloud computing environments; Computer security consultancy; Computer software design; Computer system analysis; Computer virus, malware, worms, trojans, spyware, adware, ransomware and data exfiltration protection services; Data security consultancy; Maintenance of computer software; Monitoring of computer systems by online scanning, machine learning and digital forensics technology to ensure proper functioning; Monitoring of computer systems for detecting data breach; Monitoring of computer systems for detecting unauthorized access; Monitoring of computer systems to detect breakdowns; Computer network security administration services, namely, restricting computer networks to access malicious domains; Computer network security administration services, namely, restricting computer networks to access malicious web sites; Platform as a service (PAAS) featuring computer software platforms for detecting and analyzing computer and network security threats; Software as a service (SAAS) services featuring software for detecting and analyzing computer and network security threats; Updating of computer software
Computer and Scientific