88086425
Aug 21, 2018
Computer software for protection of electronic data from unintended or unauthorized access, change or destruction; computer software for identification of computer user, application, system and network anomalies; computer software for analysis of computer user, application, system and network data; computer software for detection and isolation of cyber threats; computer software for computer network security threat analysis; computer software for computer network forensics; computer software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; computer anti-virus software; next-generation computer anti-virus software; computer networking hardware
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for protection of electronic data from unintended or unauthorized access, change or destruction; providing temporary use of non-downloadable cloud-based software for identification of computer user, application, system and network anomalies; providing temporary use of non-downloadable cloud-based software for detection and isolation of cyber threats; providing temporary use of non-downloadable cloud-based software for computer network security threat analysis; providing temporary use of non-downloadable cloud-based software for computer network forensics; providing temporary use of non-downloadable cloud-based software for monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; providing temporary use of non-downloadable computer anti-virus software and next-generation computer anti-virus software; computer security threat analysis for protecting data; computer services, namely, computer network forensics services; computer services, namely, monitoring and analysis of computer network traffic and associated security events and artifacts for the purpose of information gathering, legal evidence gathering or intrusion detection; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; technical support services, namely, installation, administration and troubleshooting of computer applications
Computer and Scientific