Class 042: Providing on-line non-downloadable software for network diagnostics, troubleshooting, and validation of low-level firmware and hardware platforms running any network operating system
Class 009: Recorded computer software for network diagnostics, troubleshooting, and validation of low-level firmware and hardware platforms running any network operating system
Software as a service (SAAS) services featuring software for accessing and communicating with SaaS applications and other cloud resources through an alternative, private connection that bypasses the public internet; Software as a service (SAAS) services featuring software for managing network traffic between internet and private path options; Software as a service (SAAS) services featuring software for managing cloud infrastructure through private connections
downloadable network management software for use in monitoring, managing, and configuring a group of network devices as one aggregate entity; recorded management software for use in monitoring, managing, and configuring a group of network devices as one aggregate entity; Software as a service (SAAS) services featuring software for use in monitoring, managing, and configuring a group of network devices as one aggregate entity
Software as a service (SAAS) services featuring software for interconnecting computers, servers, and storage devices; Software as a service (SAAS) services featuring software for use in monitoring, managing, configuring, connecting, controlling, provisioning, securing, and operating local area networks, data centers, routers, switches, servers and storage devices, wireless devices, wireless access point devices, and network infrastructure; Software as a service (SAAS) services featuring software for use in connecting local area networks, public networks, cloud networks, and hybrid networks and systems
Software as a service (SAAS) services featuring software platforms for analysis and consolidation of data relating to computer networks, data centers, and network infrastructure
software as a service (SAAS) services featuring computer software using artificial intelligence and machine learning for computer network security and managing computer networks; software as a service (SAAS) services featuring computer software using artificial intelligence and machine learning for threat investigations and predictive incident response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; software as a service (SAAS) services featuring software using machine learning, data analytics, and artificial intelligence in the field of network security, computer security and data security compliance risk identification and diagnosis, decision making, management, pre-emptive risk planning and mitigation, threat investigations, and network security incident responses; software as a service (SAAS) services featuring online non-downloadable chatbot software using artificial intelligence for troubleshooting of computer networks, computer network security, and computer software problems
computer hardware for interconnecting, operating, and managing wide area networks; downloadable software for interconnecting, operating, and managing wide area networks
computer hardware; computer network hardware, namely, hubs, switches and routers for computer networks; downloadable and recorded computer software for use in connecting computer networks and systems, servers and storage devices; computer network interface devices; data networking hardware, namely, devices for high-speed data communication interfaces and related protocols
software as a service (SAAS) services featuring software for interconnecting computers, servers, and storage devices; software as a service (SAAS) services featuring software for use in monitoring, managing, configuring, connecting, controlling, provisioning, securing, and operating local area networks, data centers, routers, switches, servers and storage devices, wireless devices, wireless access point devices, and network infrastructure; software as a service (SAAS) services featuring software for use in connecting local area networks, public networks, cloud networks, and hybrid networks and systems
software as a service (SAAS) services featuring software for interconnecting computers, computer networks, cloud networks, wireless access points, servers and storage devices; software as a service (SAAS) services featuring software for use in controlling the operation and management of local area networks, public networks, cloud networks, and hybrid networks; software as a service (SAAS) services featuring software for network security, monitoring network traffic and access, optimizing network performance, performing network diagnostics, detecting malware and network threats, and reporting network security and performance analytics; platform as a service (PAAS) services featuring cloud networking software for routers, switches, wireless devices, and wireless access point devices
downloadable cloud-based software for authentication and identity management; downloadable cloud-based software for use in administering and managing access to and within computer networks and systems; downloadable cloud-based software for monitoring and implementing computer security; downloadable cloud-based software for use in providing secure wireless data transmission and network security; software as a service (SAAS) services featuring cloud-based software for authentication and identity management; software as a service (SAAS) services featuring cloud-based software for use in administering and managing access to and within computer networks and systems; software as a service (SAAS) services featuring cloud-based software for monitoring and implementing computer security; software as a service (SAAS) services featuring cloud-based software for providing secure wireless data transmission and network security
downloadable cloud-based software for authentication and identity management; downloadable cloud-based software for use in administering and managing access to and within computer networks and systems; downloadable cloud-based software for monitoring and implementing computer security; downloadable cloud-based software for use in providing secure wireless data transmission and network security; software as a service (SAAS) services featuring cloud-based software for authentication and identity management; software as a service (SAAS) services featuring cloud-based software for use in administering and managing access to and within computer networks and systems; software as a service (SAAS) services featuring cloud-based software for monitoring and implementing computer security; software as a service (SAAS) services featuring cloud-based software for providing secure wireless data transmission and network security
downloadable cloud-based software for authentication and identity management; downloadable cloud-based software for use in administering and managing access to and within computer networks and systems; downloadable cloud-based software for monitoring and implementing computer security; downloadable cloud-based software for use in providing secure wireless data transmission and network security; software as a service (SAAS) services featuring cloud-based software for authentication and identity management; software as a service (SAAS) services featuring cloud-based software for use in administering and managing access to and within computer networks and systems; software as a service (SAAS) services featuring cloud-based software for monitoring and implementing computer security; software as a service (SAAS) services featuring cloud-based software for providing secure wireless data transmission and network security
NETWORK OBSERVABILITY; software as a service (SAAS) services featuring software for viewing, monitoring, analyzing, and responding to network and application telemetry
software as a service (SAAS) services featuring software for interconnecting computers, computer networks, cloud networks, wireless access points, servers and storage devices; software as a service (SAAS) services featuring software for use in controlling the operation and management of local area networks, public networks, cloud networks, and hybrid networks; software as a service (SAAS) services featuring software for network security, monitoring network traffic and access, optimizing network performance, performing network diagnostics, detecting malware and network threats, and reporting network security and performance analytics; platform as a service (PAAS) services featuring cloud networking software for routers, switches, wireless devices, and wireless access point devices
software as a service (SAAS) services featuring software for interconnecting computers, computer networks, cloud networks, wireless access points, servers and storage devices; software as a service (SAAS) services featuring software for use in controlling the operation and management of local area networks, public networks, cloud networks, and hybrid networks; software as a service (SAAS) services featuring software for network security, monitoring network traffic and access, optimizing network performance, performing network diagnostics, detecting malware and network threats, and reporting network security and performance analytics; platform as a service (PAAS) services featuring cloud networking software for routers, switches, wireless devices, and wireless access point devices
Software as a service (SAAS) services featuring software for interconnecting computers, computer networks, cloud networks, wireless access points, servers and storage devices; Software as a service (SAAS) services featuring software for use in controlling the operation and management of local area networks, public networks, cloud networks, and hybrid networks
Computer hardware and recorded computer software for managing computer networks via routers, switches, wireless communication devices, and wireless access point devices; recorded network management computer operating software programs for routers, switches, wireless communication devices, and wireless access point devices; recorded computer software for use in connecting cloud computer networks and systems, computer servers and computer storage devices | Providing temporary use of online non-downloadable computer software for managing computer networks via routers, switches, wireless communication devices, and wireless access point devices; providing temporary use of online non-downloadable network management computer operating software programs for routers, switches, wireless communication devices, and wireless access point devices; providing temporary use of online non-downloadable computer software for use in connecting cloud computer networks and systems, computer servers and computer storage devices
Class 009: Computer hardware and recorded computer software for managing computer networks via routers, switches, wireless communication devices, and wireless access point devices; recorded network management computer operating software programs for routers, switches, wireless communication devices, and wireless access point devices; recorded computer software for use in connecting cloud computer networks and systems, computer servers and computer storage devices
Downloadable network management software for routers, switches, wireless devices, and wireless access point devices; Downloadable network management computer operating programs for routers, switches, wireless devices, and wireless access point devices; Downloadable computer software for use in connecting cloud computer networks and systems, servers and storage devices | Software as a service (SAAS) services featuring cloud networking software for routers, switches, wireless devices, and wireless access point devices for use in connecting, managing, and operating cloud computer networks and systems, servers and storage devices; Platform as a service (PAAS) services featuring cloud networking software platforms for routers, switches, wireless devices, and wireless access point devices for use in connecting, managing, and operating cloud computer networks and systems, servers and storage devices; Providing temporary use of online, non-downloadable network management software for routers, switches, wireless devices, and wireless access point devices; Providing temporary use of online, non-downloadable network management computer operating programs for routers, switches, wireless devices, and wireless access point devices; Providing temporary use of online, non-downloadable computer software for use in connecting cloud computer networks and systems, servers and storage devices
Downloadable network management software for routers, switches, wireless devices, and wireless access point devices; Downloadable network management computer operating programs for routers, switches, wireless devices, and wireless access point devices; Downloadable computer software for use in connecting cloud computer networks and systems, servers and storage devices | Software as a service (SAAS) services featuring cloud networking software for routers, switches, wireless devices, and wireless access point devices for use in connecting, managing, and operating cloud computer networks and systems, servers and storage devices; Platform as a service (PAAS) services featuring cloud networking software platforms for routers, switches, wireless devices, and wireless access point devices for use in connecting, managing, and operating cloud computer networks and systems, servers and storage devices; Providing temporary use of online, non-downloadable network management software for routers, switches, wireless devices, and wireless access point devices; Providing temporary use of online, non-downloadable network management computer operating programs for routers, switches, wireless devices, and wireless access point devices; Providing temporary use of online, non-downloadable computer software for use in connecting cloud computer networks and systems, servers and storage devices
On-line journals, namely, blogs in the field of information technology security and vulnerability | Providing information in the field of information technology security and vulnerability, including information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices
technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others | information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions, all for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing access to secure networks; providing temporary use of non-downloadable computer software for enterprise network security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for threat investigations and incident response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for threat hunting, namely, for searching through computer networks to detect and isolate network security threats
network security appliance comprised of computer hardware and artificial intelligence-based downloadable software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and downloadable software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions, all for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable anti-malware software applications; downloadable computer software for providing network, Internet, and computer security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing access to secure networks; downloadable computer software for enterprise network security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; downloadable computer software for threat investigations and incident response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; downloadable computer software for threat hunting, namely, for searching through computer networks to detect and isolate network security threats
Software as a service (SAAS) services featuring software for connecting, operating, monitoring, and managing networked devices via computer networks; Software as a service (SAAS) services featuring software for connecting, operating, monitoring, and managing networked devices in the internet of things; Software as a service (SAAS) services featuring software for managing machine-to-machine applications and machine-to-machine networks; Software as a service (SAAS) services featuring software for computer network security and software for control, access to, and analysis of security risks to computer systems and network control systems; Software as a service (SAAS) services featuring data visualization software that monitors, identifies, and reports on computer network and cloud network connectivity, resources, security risks, and metrics
"CLOUD"; Software as a service (SAAS) services, featuring data visualization software that monitors, identifies, and reports on computer network and cloud network connectivity, resources, and metrics
Computer operating programs for routers and switches; computer operating systems that allow applications to be installed and executed in isolation and that coordinate operating system services; computer operating systems that allow decoupling of networking capabilities from system management features; computer operating systems that allow decoupling individual features and platform support from one another; computer software in the field of computer program application development for use in automating the creation and distribution of containerized computer program applications and for executing computer program applications using containerization
Development of computer hardware platforms; integration of computer systems and networks; computer programming services; design, development, deployment, implementation, analysis, integration, and management of computer software for others; installation, modification, maintenance, and repair of computer software; customization and configuration of computer software
Class 042: Development of computer hardware platforms; integration of computer systems and networks; computer programming services; design, development, deployment, implementation, analysis, integration, and management of computer software for others; installation, modification, maintenance, and repair of computer software; customization and configuration of computer software
Development of computer hardware platforms; integration of computer systems and networks; computer programming services; design, development, deployment, implementation, analysis, integration, and management of computer software for others; installation, modification, maintenance, and repair of computer software; customization and configuration of computer software
Software as a service (SAAS) services featuring software for monitoring, managing, configuring, provisioning and operating computer networks, data centers, and network infrastructure; development of computer hardware platforms; integration of computer systems and networks; computer programming services; design, development, deployment, implementation, analysis, integration, and management of computer software for others; installation, modification, maintenance, and repair of computer software; customization and configuration of computer software and hardware
Software as a service (SAAS) services featuring software for monitoring, managing, configuring, provisioning and operating computer networks, data centers, and network infrastructure; development of computer hardware platforms; integration of computer systems and networks; computer programming services; design, development, deployment, implementation, analysis, integration, and management of computer software for others; installation, modification, maintenance, and repair of computer software; customization and configuration of computer software and hardware
computer hardware and software for monitoring, managing, configuring, provisioning and operating computer networks, data centers, and network infrastructure; computer network operating systems; computer hardware and software for use in and with networks and data centers; instructional manuals sold as a unit therewith
computer hardware and software for monitoring, managing, configuring, provisioning and operating computer networks, data centers, and network infrastructure; computer network operating systems; computer hardware and software for use in and with networks and data centers; instructional manuals sold as a unit therewith
computer hardware; computer hardware platforms; computer hardware that allows for continued functionality, customization, integration and monitoring of computer networks during network reconfiguration and upgrades; Integration of computer systems and networks; computer services, namely, providing an online network application that allows for continued functionality, customization, integration and monitoring of computer networks during network reconfiguration and upgrades
educational services, namely, providing of training and educational courses related to computer network hardware and software; computer hardware; computer network hardware, namely, hubs, switches and routers for computer networks; computer software for use in connecting computer networks and systems, servers and storage devices; technical support services, namely, administration and troubleshooting of computer network hardware and software; design and development of computer software
COMPUTER HARDWARE; COMPUTER HARDWARE, NETWORK SWITCHES AND SOFTWARE FOR CONTROLLING, INTERCONNECTING, MANAGING, SECURING AND OPERATING LOCAL AND WIDE AREA NETWORKS AND SYSTEMS; COMPUTER NETWORK HARDWARE; COMPUTER NETWORK SWITCHES AND SOFTWARE THAT ENABLE COMMUNICATION BETWEEN NETWORK LAYERS IN CONVERGED NETWORKS; COMPUTER NETWORK HUBS, SWITCHES AND ROUTERS; COMPUTER NETWORK INTERFACE DEVICES
networking software for interconnecting computers, servers and storage devices; computer software for use in controlling the operation and management of local area networks; computer software for use in connecting computer networks and systems, servers and storage devices
Networking hardware and software for interconnecting computers, servers and storage devices; computer software for use in controlling the operation and management of local area networks; computer software for use in connecting computer networks and systems, servers and storage devices; instructional manuals sold as a unit therewith