79165767
Nov 7, 2014
Jun 28, 2016
Scientific, checking and supervision apparatus and instruments for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer networks security, namely computer software, sensing and signaling devices, encoding and decoding apparatus for controlling network attacks; apparatus for recording, transmission or reproduction of sound or images; blank magnetic recording media, blank optical or sound recording disks; computers, data processing equipment, namely, computers, computer peripherals, electronic modules, telecommunication apparatus comprising communication hub, communication software, digital transmitter, optical data link, optical receiver and transceiver, and computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; electronic tablets, smartphones, e-book readers; software programs, particularly software for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; computer peripheral devices; blank memory cards; integrated circuit cards
Electrical and Scientific ApparatusTelecommunications, namely, providing electronic telecommunication connections, providing data transmission and reception services via telecommunication means, providing telecommunications routing and junction gateway services in the field of computer networks security; communications via computer terminals, fiber-optic networks, computer networks, and hardware and devices for computer security networks; provision of telecommunication connections between computer networks; rental of telecommunication apparatus; Providing transmission of information between computer networks by cable, wireless and electronic communication networks; lending and rental of telecommunication apparatus
TelecommunicationsScientific and technical research in the field of network attacks and computer network security; design and development of computers and software; research and development of new products for others; computer and technical project studies particularly in the field of computer security and computer networks; design, installation, development, enhancement, updating, rental and maintenance of software particularly of software for computer security and for protecting computer networks; computer programming; computer system analysis; design of computer systems; conversion of computer programs and data other than physical conversion; conversion of data or documents from physical to electronic media, as well as between electronic media; lending and rental of hardware namely computers, computer peripherals, electronic modules, storage apparatus and devices computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; consultancy relating to computer, software and computer hardware and device design and development; digitization of documents; software as a service (SaaS) for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; cloud computing namely, clouding hosting provider services; information technology consultancy, particularly in the field of computer security and computer networks; authentication of works of art; electronic data storage
Computer and Scientific