Computer hardware in the field of internet and network security; computer hardware with embedded recorded computer software for protecting and securing computer systems and networks; computer hardware for protecting and securing computer systems and networks; downloadable computer software for protecting and securing computer systems and networks; downloadable computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware; Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; computer security services, namely, providing computer and information technology security services through the cloud, for protecting data and information from unauthorized access and for detecting and preventing computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware
Computer hardware for use in the field of internet and network security; Downloadable or recorded computer software for protection, detection, and prevention of threats in the field of Internet and network security; Downloadable or recorded computer software for protecting and securing computer systems and networks; Downloadable or recorded computer software for protecting and securing computer systems and networks; Computer hardware with embedded technology designed to protect and secure computer systems and networks; Downloadable or recorded computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware | Printed matter, namely, paper signs and manuals in the field of cyber security; Printed matter, namely, instructional and technical manuals in the field of cyber security; Printed matter, namely, datasheets in the field of cyber security; Printed matter, namely, product documentation in the nature of informational product flyers in the field of cyber security; Printed training materials in the field of cyber security; Printed catalogues in the field of cyber security; Printed brochures about cyber security | Training services, namely, provision of training in the field of cyber security; Provision of training courses, namely, arranging and conducting of training courses in the field of cyber security; Provision of training programs, namely, arranging and conducting of training programs in the field of cyber security; Educational services, namely, providing classes, seminars, non-downloadable webinars and workshops in the field of cyber security; Arranging of educational conferences in the field of cyber security; Conducting of educational seminars in the field of cyber security; Teaching in the field of cyber security; Arranging and conducting of workshops, tutorials, seminars and conferences in the field of cyber security; Arranging professional workshop and training courses in the field of cyber security; Providing of training and further training in the field of cyber security ; Training services in the field of personal development; Vocational training, namely, vocational education in the field of cyber security; Educational services, namely, providing of training and education classes in the field of cyber security; Providing online training courses, workshops in the field of cyber security; Providing online training seminars in the field of cyber security; Providing online information in the field of cyber security training | Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; Computer security services, namely, providing computer and information technology security services through the cloud in the nature of access control, policy management, threat detection, threat prevention, security forensics, machine learning visualization, misconfiguration detection, and enforcement of security best practices and compliance frameworks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware
Computer hardware and computer software for preventing malware and zero-day attacks in the field of internet and network security; computer software and technology embedded in hardware, namely, integrated computer hardware appliances for protecting and securing computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware; Printed matter, namely, instructional and technical manuals, datasheets, informational product flyers, training materials, catalogues, and brochures, all in the field of internet and network security; Software as a service services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; providing computer and information technology security services through the cloud, namely, scanning, emulation of files and penetration testing of computers and networks to assess information security vulnerability and for preventing malware and zero-day attacks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware
Class 009: computer software for detecting security attacks and protecting computer networks from security attacks; Class 042: computer service that provides software updates for network security software
Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management
"Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management
"Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management
Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management
Electronic databases, recorded on computer media, for customers pertaining to[--] * -- * computer software to protect systems[for] *from * unauthorized access and to protect the security of computer networks; computer software and technology embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for Internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management
Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software embedded in hardware designed to protect and secure computer systems and networks from unauthorized access; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management
Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software for internet service providers and telecommunication companies for managing network infrastructure, traffic management and IP management
Computer software to protect systems from unauthorized access and to protect the security of computer networks; computer software and embedded technology, namely, a software interface designed to optimize performance of security of computers and networks from unauthorized access by transferring security functions among several software modules; computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management
Computer software to protect systems from unauthorized access and to protect the security of computer networks; embedded technology namely, software designed to synchronize multiple computers through networks for the purposes of fault tolerance in relationship to security and unauthorized access, computer software for internet service providers and telecommunications companies for managing network infrastructure, traffic management and IP management; "CLUSTERING"
Computer hardware and software constituting computer architecture capable of creating virtual private networks, in the field of computer network security
GENERAL USE COMPUTER SOFTWARE FOR ENTERPRISE MANAGEMENT OF ACCESS CONTROL, USER AUTHENTICATION, VIRTUAL PRIVATE NETWORKS, NETWORK ADDRESS TRANSLATIONS, AND CONTENT SECURITY IN INTRANETS AND EXTRANETS, FOR MANAGING COMPUTER NETWORK INFRASTRUCTURE, FOR TRAFFIC MANAGEMENT OF GENERAL AND SECURED ACCESS TO WEB PAGES, INFORMATION AND DATA TRANSMISSIONS, FOR SUPPORTING E-COMMERCE TRANSACTIONS, FOR ELECTRONIC MAIL COMMUNICATIONS, AND FOR PROTOCOL MANAGEMENT OF GENERAL AND SECURED ACCESS TO WEB PAGES AND INTERCONNECTED COMPUTER NETWORKS
computer software intended to protect computer systems from unauthorized access via computer networks and instructional and technical manuals sold therewith
software and/or applications incorporated into computers and/or network systems used in data networks to control network traffic flow, establish trusted links over the network and/or internet, prevent network attacks (as opposed to physical attacks and/or theft) and to integrate various technologies into a uniform network security policy sold primarily through value added resellers and system integrators, computer and network equipment providers, telecommunications and internet service providers
software and/or applications incorporated into computers and/or network systems used in data networks to control network traffic flow, establish trusted links over the network and/or internet, prevent network attacks (as opposed to physical attacks and/or theft) and to integrate various technologies into a uniform network security policy sold primarily through value added resellers and system integrators, computer and network equipment providers, telecommunications and internet service providers
computer software intended to protect computer systems from unauthorized access via computer networks; printed matter in the form of catalogs, brochures, instructional and technical manuals about computer software intended to protect computer systems from unauthorized access via computer networks
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.