85607973
Apr 25, 2012
Computer software systems, namely, computer software and hardware for providing network, internet and computer security, protecting and securing the integrity of data and preventing data loss on computer systems, networks and applications; computer software and hardware for developing, testing, operating and managing data and information systems, application and services; computer software for providing online identity protection, authentication of users and privacy control
Electrical and Scientific ApparatusComputer services, namely, analyzing data by scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; analyzing electronic documents and e-mail to ensure authenticity; data collection service using proprietary software to evaluate, analyze and collect service data; Internet Protocol (IP) address verification services; Testing, analysis, and evaluation of personal and enterprise data protection policies including policies governing access, use, distribution of data pertaining to objects, processes, events, persons, and states of affairs comprising a social commerce service application, namely, personalized communication, event and data processing, advertising, and commerce applications to assure compliance with individual service application user and prevailing computer and service application industry standards; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer services, namely, providing a platform to allow users to request and receive content; Computer software as a service (SAAS) services, namely, hosting software for use by others
Computer and ScientificAuthentication, issuance and validation of digital certificates; Analyzing data in computer databases for criminal activity; Regulatory compliance consulting in the field of personal and enterprise private data protection, authenticity, and provenance assurance
Personal