Computer software for use in computer, data, network and mobile device security, namely, computer software for protecting and securing the integrity of data, computer networks and mobile devices; computer software for providing authentication of users, and privacy control; computer software for managing data for virtualization and enterprise computing
Electrical and Scientific ApparatusTelecommunications services, namely, providing secure, private, scalable, multiple user network interconnectivity to a network of remote servers hosted on the Internet to store, manage, and process data; telecommunications gateway services, namely, providing gateway links to connect enterprise networks to applications; providing third party users with access to a network of remote servers hosted on the Internet to store, manage, and process data; communications services, namely, providing third party users with access to a network of remote servers hosted on the Internet to design, develop, provide, and manage computing solutions
Telecommunicationsa network of remote servers hosted on the Internet to store, manage, and process data featuring software for use in computer, data, network and mobile device security, namely, computer software for protecting and securing the integrity of data, computer networks and mobile device; consulting services in the field of computing and security; software as a service (SAAS) services featuring software for use in computer, data, network and mobile device security, namely, computer software for protecting and securing the integrity of data, computer networks and mobile devices; platform as a service (PAAS) featuring computer software platforms for use in computer, data, network and mobile device security, namely, computer software for protecting and securing the integrity of data, computer networks and mobile device; infrastructure as a service (IAAS) featuring computer software platforms for use in computer, data, network and mobile device security, namely, computer software for protecting and securing the integrity of data, computer networks and mobile device; computer consultation in the field of computer security; providing online information regarding privacy protection on the global computer network; website protection services to remotely monitor and detect vulnerabilities, malware, viruses, and other data compromise and code infections
Computer and Scientific