computer hardware with preinstalled software for creating, enabling, accessing, and managing data security software modules; computer hardware with preinstalled software for encryption; computer hardware with preinstalled software for use in the encryption and decryption, and generation and examination of digital signatures and message authentication codes, including audio, video, text, binary codes, files, images, graphics and multimedia files; computer hardware with preinstalled software for creating, enabling, accessing, and managing data security programs; computer hardware with preinstalled software for creating, enabling, accessing, and managing data security, which can be downloaded from a global computer network; downloadable and recorded computer software for ensuring the security of computer programs; computer hardware with preinstalled software for enabling secure updates of the system; computer hardware with preinstalled software for ensuring user authentication and key management
Electrical and Scientific ApparatusComputer virus protection services; Application service provider (ASP) featuring software for securing and managing sensitive system data, including encryption keys, digital certificates, personally identifiable information (PII), billing information, and other critical information within secure systems and enterprise environments; Data security services, namely, computer security threat analysis for protecting data and data security consultancy; Development of computer software for security management; Design and development of Internet security programs; Computer security system monitoring services, namely, computer security threat analysis for protecting data; Software as a service (SaaS) featuring software for protecting and managing sensitive content data provided by content providers, ensuring the security of data generated or stored by applications installed on devices and user-generated content within secure systems and environments; Computer virus protection services; Software as a service featuring software for use in network security and for assuring, managing, and maintaining the integrity of computer hardware, servers, networks, applications, data, and databases for the analysis and filtering of network traffic; Software as a service for the detection and removal of computer intrusions, viruses, and other malicious applications or threats on or to networks, computers, servers, mobile phones and personal data assistants; Software as a service featuring software for securing internet protocol; Providing temporary use of online non-downloadable computer software for antivirus, anti-spam, anti-spyware, anti-malware, anti-worm, anti-Trojan, VPN (virtual private network) access security, intrusion prevention, web filtering, security, and firewall protection; Software as a service featuring software for monitoring, logging, aggregating, collecting, analyzing and reporting of network information, data and traffic to optimize network efficiency, security and integrity; Design and development of computer software for fail-open network protection; Software as a service featuring software for the management, monitoring and reporting of network firewalls and security systems; Providing temporary use of online non-downloadable computer software for enabling secure updates of the system; Computer services for use in user authentication and digital key management, namely, providing secure storage and management of user authentication credentials, such as PINs, passwords, and patterns, ensuring their protection against unauthorized access and breaches; Computer security services in the nature of securely handling and managing digital keys
Computer and Scientific