86657004
Jun 9, 2015
Aug 9, 2016
Computer software for accessing and using cloud computing networks, for operating and maintaining computer networks and servers, and for managing and deploying cloud computing resources; computer software for conversion, onboarding, migration, and deployment of network devices, virtual machines, mobile devices, servers, server systems, and data centers to run on private cloud-based environments; computer software for monitoring and analyzing requests to and responses from network-based devices, servers, services, and applications; computer software for restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities; computer software for analyzing global computer information network device characteristics, internal computer network traffic patterns, outgoing computer network traffic patterns, and traffic characteristics for compliance with a security protocol
Electrical and Scientific ApparatusComputer services and technical support services, namely, remote and on-site infrastructure management services for implementation, monitoring, administration and management of private cloud computing IT and application systems; technical consulting services in the field of private cloud computing solutions, and evaluation and implementation of private cloud computing IT and application systems; technical consultation in the fields of conversion, onboarding, migration, and deployment of network devices, virtual machines, mobile devices, servers, server systems, and data centers to run on private cloud-based environments; computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network device characteristics, internal computer network traffic patterns, outgoing computer network traffic patterns, and traffic characteristics for compliance with a security protocol
Computer and Scientific