98451646
Mar 15, 2024
Downloadable computer software and hardware for network security, namely, firewall, unified threat management and virtual private network capabilities in the fields of security monitoring, identification of malware and spam, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks, and manuals sold as a unit; Downloadable computer software for management of computer networks and wireless access points; Downloadable computer software for management of traffic on computer networks; Downloadable computer software for management of other computer applications on a computer network; Downloadable computer software providing a graphical user interface for management of networked servers; Downloadable computer software for management and analysis of use of wireless networks by users; Downloadable computer software used for protection and management of confidential data and personally identifiable information.
Electrical and Scientific ApparatusProviding online non-downloadable software for identifying malware attacks; Providing online non-downloadable software used for detection of malicious websites, botnets, and wireless access points; Providing online non-downloadable software providing the ability to manage traffic on a computer network; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing online non-downloadable software for management of computer software applications on a user's network; Providing online non-downloadable computer software for visualization of connected devices and wireless access points; Providing online non-downloadable software for monitoring, managing, and anonymizing personally identifying information and protecting confidential data on computer networks; computer security services in the nature of providing authentication, issuance, and validation of network users; online cloud-based services used for authentication in the fields of security monitoring, access control, information flow control, and facilitating computer connections for local area, wide area and global computer networks; Computer security services, namely, online monitoring computer networks for securing and protecting data and information from unauthorized access and malware attacks; Technical support, namely, online monitoring the technological functions of computer network systems.
Computer and Scientific