computer software for use in the encryption, decryption, and protection of computer applications, virtual machine images, and digital files, including executable, audio, video, text, binary, still images, graphics and multimedia files; software for ensuring the security of virtual machine images and digital files, including executable, audio, video, text, binary, still images, graphics and multimedia files; downloadable cloud computer software for use in database management and electronic storage of data; downloadable software for use in database management and electronic storage of data; downloadable software for management of encryption keys and user, data, and device access policies; downloadable software for discovery of at-risk data in cloud or virtual machine environments
Electrical and Scientific Apparatusnon-downloadable software for management of encryption keys and user, data, and device access policies; computer network security services, namely, restricting access to and by computer networks to undesired web sites, computer applications, media, individuals, facilities and geographic regions; related security monitoring and reporting functions; design and development of electronic data security systems; data encryption and decryption services; providing a website featuring non-downloadable software for use in database management and electronic storage and retrieval of data; cloud computing featuring software for use in database management and electronic storage and retrieval of data; providing data security for virtual computer systems and virtual computer environments through cloud computing; updating and maintaining cloud-based computer software through on-line updates; computer security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; on-line access to administrative controls, access management, licensing, and billing systems
Computer and Scientificmonitoring of physical or virtual computer systems, web applications, and device and user access for security purposes; computer network security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys, digital certificates, and prevention of computer risks; providing data security for physical computer systems and physical computer environments through cloud computing
Personal