87708418
Dec 5, 2017
Computer hardware; Computer hardware, namely, firewalls and networks security devices; Computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; Computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; Computer software for providing security and protection of data, networks and communications; Downloadable computer software for providing security and protection of data, networks and communications; Computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; Computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; Computer software, namely, network security software applications for controlling and managing access server applications; Computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; Computer security and information technology products, namely, computer software for authorizing access to databases
Electrical and Scientific ApparatusComputer security consultancy; Computer technology consultancy; Providing temporary use of non downloadable computer software, namely, software for monitoring web security and protection, detecting of suspicious or malicious user activity, monitoring unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; Computer security services, namely, restricting unauthorized network access by users without credentials by concealing or reshaping the interfaces of a website; Providing a secure electronic online system featuring technology that monitors and allows accessing of a real time proactive defense mechanisms for vulnerable systems; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems by remote access to ensure proper functioning; Cloud computing services, namely, providing temporary use of non-downloadable cloud computing software for use in database management for computer security and prevention and mitigation of computer risks; Providing on-line computer databases in the fields of computer security and prevention and mitigation of computer risks; Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; Provision of technical information in the field of computer security risk and internet security risk consultancy; Computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; Design and development of computer hardware and software for use in computer network security and protection; Technological consultation in the field of computer networking and network security; Technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical support services, namely, 24/7 monitoring of network application related to the design, development and management of cyber-security systems for others; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; Maintenance of computer software; Software as a service (SAAS) services featuring software for providing security and protection for use in computer network security; Software as a service (SAAS) services, namely, hosting software for use by others for providing security and protection for use in computer network security; Software as a Service (SaaS) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software
Computer and Scientific