Computer hardware and recorded and downloadable software systems for use in network security, monitoring and optimization; recorded and downloadable computer programs for connecting remotely to computers or computer networks; recorded and downloadable computer programs for use in network security, monitoring and optimization; recorded and downloadable computer software and hardware for use in network security, monitoring and optimization; recorded and downloadable computer software for the creation of firewalls; recorded and downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded and downloadable computer software for use in network security, monitoring and optimization; downloadable computer software for use in network security, monitoring and optimization that may be downloaded from a global computer network; recorded and downloadable computer software platforms for use in network security, monitoring and optimization; computers for network management; electronic software updates, namely, downloadable computer software and associated downloadable electronic data files for updating computer software in the fields of use in network security, monitoring and optimization, provided via computer and communication networks; Computer services, namely, creating website-based indexes of information, websites and other resources available on computer networks; computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; computer services, namely, providing search engines for obtaining data on a global computer network; computer virus protection services; consulting services regarding computer security; cloud based computer application and network enterprise security services to detect and mitigate distributed denial of service (DDoS) attacks, cyber risks, threats and vulnerabilities, scanning and preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable cloud-based software for use in monitoring computer network security; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of distributed denial of service (DDoS) detection; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of advance threat protection; providing on-line non-downloadable operating software for accessing data, analytics, and presentation of information; software as a service (SAAS) services featuring software for gathering, displaying and analyzing data from networks and enterprises; computer software development and computer programming development for others; development, updating and maintenance of computer software; technical support services, namely, troubleshooting of computer software problems; cloud based computer network security services, namely, monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (DDoS) attacks on computer servers connected to the internet
Downloadable software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security, in the field of cyber security vulnerability testing of networked devices; computer software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security for providing cyber security for global computer networks; "DEFENSE"; Cloud computing featuring software for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (saas) featuring software for use in providing threat prevention, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; software as a service (saas) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, laptops, mobile devices and tablet computers; platform as a service (paas) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (paas) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, laptops, mobile devices and tablet computers; providing online non-downloadable software for use, including on a real-time basis, in providing operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, and laptops, mobile devices and tablet computers; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, laptops, mobile devices and tablet computers, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis
"INTELLIGENCE FEED"; Computer services, namely, creating indexes of information, sites and other resources available on computer networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; Computer services, namely, providing search engines for obtaining data on a global computer network; Computer virus protection services; Monitoring of computer systems for security purposes, namely, computer security threat analysis for protecting data
Downloadable electronic publications in the nature of research reports in the field of information and telecommunications technology; "INFRASTRUCTURE SECURITY REPORT"
Anti-spyware software; Computer anti-virus software; Computer hardware and software systems for use in network security, monitoring and optimization; Computer programs for connecting remotely to computers or computer networks; Computer programs for use in network security, monitoring and optimization; Computer software and hardware for use in network security, monitoring and optimization; Computer software for the creation of firewalls; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in network security, monitoring and optimization; Computer software for use in network security, monitoring and optimization that may be downloaded from a global computer network; Computer software platforms for use in network security, monitoring and optimization; Computers for network management; Electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of use in network security, monitoring and optimization, provided via computer and communication networks; "NETWORKS"; [ Computer services, namely, creating indexes of information, sites and other resources available on computer networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; Computer services, namely, providing search engines for obtaining data on a global computer network; Computer virus protection services; consulting services regarding computer security; Maintenance of computer software relating to computer security and prevention of computer risks; Computer security threat analysis for protecting data ]
Class 042: Cloud based computer application and network enterprise security services to detect and mitigate distributed denial of service (DDoS) attacks, cyber risks, threats and vulnerabilities, scanning and preventing penetration by unauthorized computers and networks; providing temporary use of non-downloadable cloud-based software for use in monitoring computer network security; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of distributed denial-of-service (DDoS) detection; cloud computing featuring software for enterprise testing, management, security and maintenance in the field of advance threat protection; providing on-line non-downloadable operating software for accessing data, analytics, and presentation of information; software as a service (SAAS) services featuring software for gathering, displaying and analyzing data from networks and enterprises; computer software development and computer programming development for others; development, updating and maintenance of computer software; technical support services, namely, troubleshooting of computer software problems; Class 045: Cloud based computer network security services, namely, monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (DDOS) attacks on computer servers connected to the Internet
Class 009: Anti-spyware software; Computer anti-virus software; Computer hardware and software systems for use in network security, monitoring and optimization; Computer programs for connecting remotely to computers or computer networks; Computer programs for use in network security, monitoring and optimization; Computer software and hardware for use in network security, monitoring and optimization; Computer software for the creation of firewalls; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in network security, monitoring and optimization; Computer software for use in network security, monitoring and optimization that may be downloaded from a global computer network; Computer software platforms for use in network security, monitoring and optimization; Computers for network management; Electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of use in network security, monitoring and optimization, provided via computer and communication networks
Computer services, namely, creating indexes of information, sites and other resources available on computer networks; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; Computer services, namely, providing search engines for obtaining data on a global computer network; Computer virus protection services | Monitoring of computer systems for security purposes