79365787
Dec 7, 2022
Providing access to data in computer networks; providing access to information via data networks; providing users with secure remote access via the internet to private computer networks; transmission of information by computer; remote data access services via internet and intranet; electronic data transmission; wireless electronic transmission of data; electronic file transfer, namely, diverse data transfer protocols; electronic transmission of data; electronic transmission of messages; transmission of information on-line; data bank interconnection services, namely, electronic exchange of data stored in databases accessible via Transmission Control Protocol (TCP) and Internet Protocol (IP); transmission of digital files; delivery of messages and data by electronic transmission; transmission of digital information; transmission of computerized documents; transmission of data by electronic means; transmission of information by electronic means; providing access to electronic communications networks and electronic databases; digital transmission of data; communication services for the electronic transmission of data; electronic transmission of documents; electronic transmission of information ; electronic transmission of messages and data; secure electronic transmission of data, sound or images; electronic transmission of data, messages and information; electronic packet transmission of data and images; electronic message sending
TelecommunicationsAutomatic access security apparatus, namely, control panel and controllers
Electrical and Scientific ApparatusComputer security threat analysis for protecting data; user authentication services using single sign-on technology for online software applications; computer security services for protection against illegal network access; development of technologies for the protection of electronic networks; disaster recovery services for data communications systems, namely, remote computer backup services and electronic data backup services; monitoring of computer systems for detecting unauthorized access or data breach; technical support, namely, monitoring technical functions of computer network systems; IT security, protection and restoration, namely, monitoring of computer systems for detecting unauthorized access or data breach and electronic data back-up services; evaluation of performance of data-processing software against benchmark references; IT consultancy services; testing received and sent data packages in the nature of deep data package inspections, computer intrusion inspections, access-control inspection, and context-anomalies-inspections; authentication, namely, access authentication via lightweight directory access protocol (LDAP) and security assertion mark-up language (SAML); quality control for others
Computer and Scientific