Computer software, namely, downloadable computer utility program for analyzing function and performance of other computer programs; server software, namely, downloadable computer utility program for analyzing function and performance of other computer programs
Downloadable computer programs for project management, product management, work collaboration, information technology portfolio management, and business process management; all aforementioned goods/services only in the context of financial investment management software and not in the context of security, law-enforcement, defense and military software | Non-downloadable, cloud-based computer programs for project management, product management, work collaboration, information technology portfolio management, and business process management; all aforementioned goods/services only in the context of financial investment management software and not in the context of security, law-enforcement, defense and military software
Software as a service (SAAS) services featuring software for project management, product management, work collaboration, and software development and implementation
Software as a Service (SAAS) services featuring cloud software security services, namely, monitoring of cloud services usage, controlling per-user access, governance and auditing of cloud services, data security, information protection, data loss prevention, management of security policies, security analytics and forensic analysis
Educational services, namely, conducting computer security training and classes in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, and distribution of training material in connection herewith; "MAINFRAME"
Class 009: Downloadable software for computer security; downloadable software in the field of information security management systems for information technology (IT) infrastructure and systems security, for user and entity behavioral analytics, predictive analytics for computer and network security, profiling and analyzing users, endpoints, applications and other entities independently and then correlates the data to identify threats, prioritize alerts, and communicate relevant information to the appropriate stakeholders, identifying anomalies in privileged user access, insight into third party vendor behavior, and intelligence about vulnerabilities within organizations' attack surface, detection, blocking, and facilitating removal and remediation of cyber-attacks, malicious attacks, insider threats, outsider threats, anomalous user behavior, compromised end points, compromised users, exploitable assets susceptible to threats, privilege account abuse, observed privilege activity, data exfiltration, phishing, bots, time bombs, worms, and advanced persistent threats, identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices, providing remediation and responder portal, providing just-in-time awareness training modules that personalize cyber education to change user behavior and shift the culture of the organization, providing executive dashboards and security self-service portals for cyber risk management, predicting and stopping crime before it happens by identifying, analyzing and correlating risky behavior and vulnerabilities across five vectors - insiders in the nature of employees, outsiders in the nature of bad actors, high privilege accounts, third party vendors and businesses' most valuable assets including who has access to them, and prioritizing the potential threats and security risk coming in through modern cyber threat vectors such as users, systems, applications, and vendors
Business management and consulting services for the data security and information technology industry, namely, providing industry expertise; business development services; advertising and marketing consultancy; market research and business analyses; business advice and analysis of markets; sales volume tracking for others; consulting in the field of sales methods; providing an Internet website portal in the field of business development, sales and marketing; arranging and conducting incentive reward programs to promote the sale of data security software and services | Educational services, namely, conducting seminars, courses, conferences, workshops, training and online training courses in the field of sales and marketing
Electronic storage of data; electronic document and email archiving services; technical support services, namely, troubleshooting of computer hardware and software problems; computer software installation services; technical consultation in the field of computer software installation and maintenance; notification and delivery of software updates; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; computer consultation in the field of computer security; providing information in the field of computer network and Internet security; [ computer services, namely, data recovery services; ] technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; development, updating and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information and online database regarding computers, computer hardware, computer software, computer networks, computer-security consultancy services, data storage management, enterprise information management, and online analytical processing (OLAP); computer security services, namely, web content categorization and filtering services; computer security services for computer networks and Internet networks, namely scanning and penetration testing of computer networks to assess information security vulnerability, and restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer consultation; computer diagnostic services; providing technical information in the field of computer software applications; application service provider services, namely, providing on-line non-downloadable software for computer security testing in the fields of computer and Internet security; remote and on-site monitoring of computer systems to ensure proper functioning; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, namely, providing information concerning the encryption and authentication of electronic data; computer security consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications
Internet security software; enterprise security software that provides security monitoring and malware removal by sharing and integration of data between network endpoints, gateways and cloud services; computer programs for data communications between security software applications; computer software for integration of information logic and data between computer security software; computer software for the transmission and correlation of data and information; computer software for managing the transmission of data
[ Educational services, namely, conducting arranging and providing online workshops, and training courses, lectures, workshops and seminars in the field of computers, technology, software, networks, security and bandwidth optimization and distribution of educational materials in connection therewith; On-line journals, namely, blogs featuring articles and commentary on computer, network and internet security, and bandwidth optimization ]; Computer hardware; Computer software for computer, network, and internet security applications, content screening and filtering, virus protection, computer and network access control and authorization management, web usage monitoring, and network bandwidth optimization and protection; Business consulting services in the field of computer, network and internet security, virus protection, network bandwidth optimization and protection; [ Computer software installation and maintenance; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support, namely, monitoring technological functions of computer network systems ]
Computer security service, namely, providing online non-downloadable software for scanning and screening of third party mobile computer applications for security flaws and mal-ware detection; consulting in the field of mobile computer application security
Computer software for providing cryptographic network security and data security functions; computer software for integration of information logic and data between computer networks; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in operating electronic mail; computer software for use in monitoring computers for security purposes; computer software for use with computer servers for controlling and managing server applications; computer software for use in accessing databases; downloadable electronic publications in the nature of user manuals, white papers, articles, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologies | [ Printed matter, namely, newsletters, instructional materials and teaching materials in the field of information technology ] | business management services, namely, providing outsource management services to others in the field of digital certificate authentication; preparation of customized business reports for others | [ providing extended warranties for authentication, encryption and certification services used to provide security in electronic transactions and communications that take place over the Internet and other computer networks; administration and processing of claims under extended warranties of authentication, encryption and certification services used to provide security in electronic transactions and communications that take place over the Internet and other computer networks ] | providing authentication of website operator identity, namely, IP address verification services; providing technical and customer support services, namely, encryption of a digital communication and technical support in the nature of computer help desk services for issuance and management of digital certificates for digital communication and digital signature authentication and encryption, over the Internet and other computer network; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creating and implementing software for issuing and managing digital certificates; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; encryption of digital certificates and signatures in electronic transactions and communication over the Internet and other computer network | managed public key infrastructure services, namely, authentication, issuance and validation of digital certificates; providing user authentication services in e-commerce transactions; business management, namely, issuance of digital certificates for authentication; issuance of digital certificates for authentication of a digital communications and digital signatures in an electronic transaction or communication, over the Internet and other computer network; monitoring of computer systems for security purposes; providing authentication of identity in the nature of authentication of personal identification information; security consulting about creating and implementing procedures and practices for issuing and managing digital certificates
Class 009: computer software, namely, enterprise management software for distributing software among computers, maintaining hardware and software inventories, configuring computers, and protecting local data and managing remote computer systems, computer software for creating and accessing searchable databases of the users' business information by authorized users; computer software for computer application development, computer software for data storage management, database management software, computer software for computer user identification and authentication, password authentication, sign-on control and encryption; computer software for administration of computer local area networks, virtual private networks and wide area networks; computer software for collecting, viewing and analyzing computer hardware inventory data; computer business application software for storage of data, data security protection, data backup, data restoring and data sharing directly for the user or for another application program for use in business; [ computer software for monitoring and controlling access to global computer networks, computer software for monitoring, tracking, troubleshooting and investigating web infrastructure; and computer software for data retention and data indexing to demonstrate best practices with regulations applicable to the industry for use in the fields of data communications; ] computer software platforms [ for grid and utility computing and ] for operating distributed applications and networks of computers; computer software for managing identities and access to data and applications in an organization and within service providers; computer software for providing identity governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; computer software for providing identities, authentication, identity proofing and identity assurance to users, companies, applications, application providers and service providers; computer software platforms for cloud computing networks and applications; computer software platforms for implementing virtualization technologies; Class 042: [ Computer consulting services; ] Computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; Technical support, namely, remote and onsite computer network technical monitoring; On-line technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems via global computer network; On-line technical support services, namely, troubleshooting of computer software problems via a global computer network; On-line computer services, namely, providing upgrades of computer software and maintenance of internal computer network software; [ computer network design services for others; Computer services, namely, providing on-line non-downloadable software for managing identities and access to data and applications in an organization and within service providers; ] computer services, namely, providing on-line non-downloadable software for identity governance, access governance, log management, access management, web services security, service oriented architecture (SOA) security, transaction security and single sign-on; [ Planning, design and implementation of virtualization technologies for enterprises and businesses ]
Class 042: Computer services, namely, acting as a software or application service provider in the field of security and compliance to provide host computer application software for managing identities and access to data and applications in an organization and within service providers, for providing identity governance, access governance, log management, access management, web services security, SOA security, transaction security and single sign-on
Class 009: COMPUTER SOFTWARE FOR MANAGING IDENTITIES AND ACCESS TO DATA AND APPLICATIONS IN AN ORGANIZATION AND WITHIN SERVICE PROVIDERS; COMPUTER SOFTWARE FOR PROVIDING IDENTITY GOVERNANCE, ACCESS GOVERNANCE, LOG MANAGEMENT, ACCESS MANAGEMENT, WEB SERVICES SECURITY, SOA SECURITY, TRANSACTION SECURITY AND SINGLE SIGN-ON
Computer software for use in the backup, storage, imaging and recovery of computer data, folders, and files; computer software for imaging, deploying, and management of computer systems and networks
Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; [Computer software for the field of warehousing and distribution, to manage transactional data, provide statistical analysis, and produce notifications and reports;] Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface | [ Computer education training ] | Computer consultation; Computer programming for others; Computer project management services; Computer services in the nature of customized web pages featuring user-defined information, personal profiles and information; Computer software consultancy; Computer software consultation; Computer software design for others; Computer software design, computer programming, or maintenance of computer software; Computer software development; Consultancy in the field of software design; Consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Data conversion of computer program data or information; Design, development and implementation of software; Development, updating and maintenance of software and data bases; Installation of computer software; Periodic upgrading of computer software for others; Providing information at the specific request of end-users by means of telephone or global computer networks; Technical support services, namely, troubleshooting of computer software problems; [Technical support services, namely, troubleshooting of industrial process control computer software problems;] Up-dating of computer software; Updating of computer programs for third parties
Class 009: Computer Software Programs, Namely, Programs that Allow Programs Operating on Different and Distinct Computer Operating System Platforms to Interact with One Another
Class 009: Computer software products, namely, enterprise management software, information management software, application development software, computer software for storage management, database management software, computer software for security management, computer software for network management, computer software for life cycle management for designing, building, deploying, managing and modeling of other business software applications, business application software, software for global computer networks, computer software for web infrastructure management
House mark of computer software products, namely, enterprise management software for distributing software among computers, maintaining hardware and software inventories, configuring computers, and protecting local data and managing remote computer systems, computer software for creating and accessing searchable databases of the users' business information by authorized users; computer software for computer application development, computer software for data storage management, database management software, computer software for computer user identification and authentication, password authentication, sign-on control and encryption; computer software for administration of computer local area networks, virtual private networks and wide area networks; computer software for collecting, viewing and analyzing computer hardware inventory data; computer business application software for storage of data, data security protection, data backup, data restoring and data sharing directly for the user or for another application program for use in business; computer software for monitoring and controlling access to global computer networks, computer software for monitoring, tracking, troubleshooting and investigating web infrastructure; and computer software for data retention and data indexing to demonstrate best practices with regulations applicable to the industry for use in the fields of data communications and telecommunications | Computer consulting services; computer security services, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; data encryption services, namely, administration of digital keys and digital certificates to ensure security of electronically transmitted data and information; technical support, namely, remote and on-site monitoring of network systems; on-line technical support services, namely, troubleshooting of computer hardware and software problems via a global computer network; on-line computer services, namely, providing upgrades of computer software and maintenance of internal computer network software; computer network design services for others
ARRANGING AND CONDUCTING BUSINESS CONFERENCES IN THE FIELD OF CURRENT TECHNOLOGY IN THE SOFTWARE INDUSTRY | ARRANGING AND CONDUCTING EDUCATIONAL CONFERENCES IN THE FIELD OF CURRENT TECHNOLOGY IN THE SOFTWARE INDUSTRY
Computer software and programs for managing and monitoring computer systems, databases, applications and networks, namely providing data management, application management, network management, service management and performance optimization and recovery of mainframe and distributed systems computers, databases, networks and business applications, programs and systems that operate therein; Professional business consultancy; export and import agencies specializing in software goods; and providing business information via on-line computer databases; Research and design for new computer software and hardware products for others; installation of computer software; maintenance of computer software; technical support services, namely, troubleshooting of computer software problems; software quality control for others; technical computer project management services; and professional computer consultancy services related to implementation, customization, support and maintenance of computer software and hardware
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.