Computer hardware; Computer switches; Ethernet switches; Electrical switches; Telecommunication switches; Computer network switches; Computer network hubs, switches and routers; Computer hardware, namely, wireless access point (WAP) devices; LAN (local area network) hardware; Computer hardware for telecommunications; LAN (local area network) access points for connecting network computer users; Network access server hardware; Electronic communications systems comprised of computer hardware and recorded software for the transmission of data between two points; Computer hardware and recorded software systems for connecting wired devices and allowing them to communicate with each other within a local area network; Computer hardware and recorded software systems for providing a central hub for securely receiving and sending data between devices within the same network
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Computer hardware, namely, wireless access point devices that integrate with computer and network security hardware devices; LAN (local area network) hardware; LAN (local area network) access points for connecting network computer users; Network access server hardware; Computer hardware and recorded software for setting up and configuring local area networks sold as a unit; Ethernet cables; Ethernet adapters; Radio transmitters, receivers, and transceivers; Downloadable software for controlling and managing wireless accept point devices; Downloadable LAN (local area network) operating software; recorded LAN (local area network) software; Downloadable Computer software that facilitates access to and modification of SSID (service set identifier) and security of routers; Downloadable software to diagnose and repair network connectivity problems; Downloadable software that facilitates access to and modification of SSID and security of routers, that facilitates rogue access point detection and client load balancing, that creates data and security reports, and that facilitates wireless communication of network security information; Downloadable software to facilitate firmware upgrades; Downloadable software to monitor internet and wireless connectivity status; Computer hardware with embedded software for controlling and managing wireless accept point devices; Computer hardware with embedded software that facilitates access to and modification of SSID (service set identifier) and security of routers; Computer hardware with embedded software that diagnoses and repairs network connectivity problems; Computer hardware with embedded software that facilitates access to and modification of SSID and security of routers, that facilitates rogue access point detection and client load balancing, that creates data and security reports, and that facilitates wireless communication of network security information; Computer hardware with embedded software that monitors internet and wireless connectivity status
Computer hardware; data processors; data processing equipment, namely, content processors; network processors; flow processors; system on a chip processors; central processing units; computer chips; integrated circuits; application-specific integrated circuits; security data processors; central processing units for processing information, data, sound or images; computer firmware for use in monitoring, analyzing, filtering or reporting of network information, data and traffic in the field of data and network security; central processing units for use in the field of data and network security; network data processors for use in the field of data and network security to accelerate data traffic and to accelerate firewall and VPN functions; computer hardware for use in data encryption and decryption; embedded computer software for use in the encryption and decryption of digital files and digital data sold as a component of computer hardware and data processing equipment; computer software and firmware for analyzing and filtering of network traffic and for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, and for providing virtual private networking and security functions; embedded computer software and firmware for monitoring, analyzing or reporting of network information, data and traffic sold as a component of computer hardware and data processing equipment
Operating system programs; Computer operating programs and computer operating systems; computer software in the field of computer and network security, for remotely controlling security devices, for connecting security hardware, and for allowing communication and interoperability of various security devices; computer operating system for use in analyzing and filtering of network traffic and for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, and for providing virtual private networking and security functions; embedded computer software and firmware for monitoring, analyzing or reporting of network information, data and traffic; computer operating systems in the field of computer and network security
Information technology consulting services; Computer software consulting; Computer consultation in the field of computer security; Computer network configuration services; Computer programming for others; Computer technology consultancy; Computer network configuration services; Computer systems analysis; Computer services, namely, on-line scanning and detecting of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Software as a service (SAAS) services featuring software for computer network security in the nature of network traffic security and forensic monitoring; Software as a service (SAAS) services featuring software for controlling and managing access server applications
Information technology consulting services; Computer software consulting; Computer consultation in the field of computer security; Computer network configuration services; Computer programming for others; Computer technology consultancy; Computer network configuration services; Computer systems analysis; Computer services, namely, on-line scanning and detecting of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Software as a service (SAAS) services featuring software for computer network security in the nature of network traffic security and forensic monitoring; Software as a service (SAAS) services featuring software for controlling and managing access server applications
Information technology consulting services; Computer software consulting; Computer consultation in the field of computer security; Computer network configuration services; Computer programming for others; Computer technology consultancy; Computer network configuration services; Computer systems analysis; Computer services, namely, on-line scanning and detecting of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Software as a service (SAAS) services featuring software for computer network security in the nature of network traffic security and forensic monitoring; Software as a service (SAAS) services featuring software for controlling and managing access server applications
computer services, namely, cloud hosting provider services; consulting services in the field of cloud computing; cloud computing featuring software for use in database management, security analytics and management service; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; technical support services, namely, remote infrastructure management services for monitoring, administration and management of public and private cloud computing it and application systems; electronic data storage; electronic storage of reports, files and documents; electronic storage of electronic media; cloud based computer services for collecting, storing, synthesizing, analyzing, and managing data and information from computer security systems; computer services, namely, hosting on-line web facilities for others for organizing and collecting information; Software as a service (SAAS) services featuring software for data analysis and management, security analytics, data automation, data collection and reporting; software as a service (SAAS) services featuring software for providing cloud-based analytics for network and computer security systems; software as a service (SAAS) services featuring software for providing real-time monitoring, alerting, updating and upgrading services for network and computer security systems; software as a service (SAAS) services featuring software for providing centralized management and storage of data, reports, and information; computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; software as a service (SAAS) services featuring software for monitoring network and security activity and for generating reports and statistics on such activity; Software as a service (SAAS) services featuring software for monitoring cyber security analytics; Software as a service (SAAS) services featuring security software for reporting on the key security indicators of network and computer security systems; software as a service (SAAS) services featuring software security analytics for predicting threats and delivering threat intelligence; software as a service (SAAS) services featuring software for allowing third parties to secure and monitor computer applications; cloud computing featuring software for use in database management and on-line storage and backup; computer services, namely, monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; computer consultation in the field of computer security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerability; maintenance of computer software; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; computer consultation services in the field of computer security auditing; computer consulting services; computer software and network security research and development services; computer software and network security management and analysis, namely, remote and on-line system management and analysis of the information technology (IT) systems and networks of others; computer software and network security management and analysis services that allows users to view risk posture and network performance, to track network activity and to access reports regarding the same; computer network security management and analysis, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer network security management and analysis in the field of updating of computer software relating to computer security and prevention of computer risks; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering and/or intrusion detection and prevention for network and computer security; troubleshooting of computer software and hardware problems and monitoring of network systems; maintenance, upgrading, and updating of computer software; computer services, namely, providing a web-based system comprised of the temporary use of non-downloadable software to be used by others in the monitoring of computer systems for security purposes
Monitoring of computer systems for security purposes; consulting services in the field of maintaining the security and integrity of databases; security consultancy
Providing return merchandise authorization services, namely, management of returned merchandise and arrangement of repair and replacement of goods for customers, namely, computer software, firmware, hardware, and network systems products; arranging for others the replacement of computer software, firmware, hardware and network systems products | Technical support services, namely, troubleshooting in the nature of the repair of computer hardware and computer networking hardware; providing on-site maintenance in connection with computer hardware and computer networking hardware; installation, maintenance and repair of computer hardware and computer networking hardware | Computer consulting services, namely, computer software, hardware, firmware, and network consulting services; computer consulting services, namely, computer software, hardware, firmware, and network security consulting services; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering and/or intrusion detection and prevention for network and computer security; troubleshooting of computer software, firmware, and hardware problems and technical monitoring of network systems; computer services, namely, providing a web-based system and online portal for users to access and track customer support request tickets, to access real-time customer support service, to access technical documentation, to access troubleshooting guides, to request technical support, and to troubleshoot software, firmware, hardware, and network issues; upgrading and updating of computer software; technical support services, namely, providing reports in the fields of computer software, firmware, hardware, and network systems for diagnosing computer hardware and software problems; technical support services, namely, providing a website featuring information for diagnosing computer software, firmware, hardware, and network systems problems; technical support services, namely, engineering services in connection with computer software, firmware, hardware, and network systems; technical support services, namely, troubleshooting in the nature of the repair of computer software and firmware; providing on-site maintenance in connection with computer software and firmware; installation, maintenance and repair of computer software and firmware
Computer network operating system featuring network security, network management, processing of network traffic, provision of network security-based applications and application enhancement; computer hardware; computer software and firmware for protecting the integrity of computer hardware, software, networks and electronic data; computer software and firmware for analyzing and filtering of network traffic and for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, and for providing virtual private networking and security functions; computer software and firmware for monitoring, analyzing or reporting of network information, data and traffic
Electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer intrusions, viruses, spam, or other malicious applications or threats and security functions protecting the integrity of computer hardware, software, networks and electronic data, provided via computer and communication networks | (Based on Use in Commerce) Computer software and network security research and development services; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering and/or intrusion detection and prevention for network and computer security; maintenance, upgrading, and updating of computer software; computer services, namely, providing a web-based system designed for the monitoring of computer systems for security purposes
Computer network operating system featuring network security, network management, processing of network traffic, provision of network security based applications and application enhancement; computer hardware; computer software and firmware for protecting the integrity of computer hardware, software, networks and electronic data; computer software and firmware for analyzing and filtering of network traffic and for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, and for providing virtual private networking and security functions; computer software and firmware for monitoring, analyzing or reporting of network information, data and traffic; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer intrusions, viruses, spam, or other malicious applications or threats and security functions protecting the integrity of computer hardware, software, networks and electronic data, provided via computer and communication networks | Computer consulting services; computer software and network security research and development services; computer software and network security management and analysis, namely, remote and on-line system management and analysis of the information technology (IT) systems and networks of others; computer software and network security management and analysis services that allows users to view risk posture and network performance, to track network activity and to access reports regarding the same; computer network security management and analysis, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer network security management and analysis in the field of updating of computer software relating to computer security and prevention of computer risks; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering and/or intrusion detection and prevention for network and computer security; troubleshooting of computer software and hardware problems and monitoring of network systems; maintenance, upgrading, and updating of computer software; computer services, namely, providing a web-based system comprised of the temporary use of non-downloadable software to be used by others in the monitoring of computer systems for security purposes
Computer network operating system featuring network security, network management, processing of network traffic, provision of network security based applications and application enhancement; computer hardware; computer software and firmware for protecting the integrity of computer hardware, software, networks and electronic data; computer software and firmware for analyzing and filtering of network traffic and for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, and for providing virtual private networking and security functions; computer software and firmware for monitoring, analyzing or reporting of network information, data and traffic; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer intrusions, viruses, spam, or other malicious applications or threats and security functions protecting the integrity of computer hardware, software, networks and electronic data, provided via computer and communication networks | Computer consulting services; computer software and network security research and development services; computer software and network security management and analysis; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering and/or intrusion detection and prevention for network and computer security; troubleshooting of computer software and hardware problems and monitoring of network systems; maintenance, upgrading, and updating of computer software; computer services, namely, providing a web-based system comprised of the temporary use of non-downloadable software to be used by others in the monitoring of computer systems for security purposes
Computer hardware; wide area and local area network hardware, firmware and software for monitoring, maintaining and protecting of networks and firewalls to promote network efficiency, security, and integrity, and for the analysis and reporting of network information, data and traffic
Computer software for protecting computer systems and mobile devices to promote network efficiency, security, and integrity, for the detection, filtering and removal of computer intrusions, viruses, spam, spyware, malware and other malicious applications or threats; computer software for web-filtering, access control and virtual private networking (VPN)
Computer hardware; wide area and local area network hardware, firmware and software for promoting the integrity of computer hardware, computer applications and computer data, for filtering of e-mail and network traffic, for the detection and removal of computer intrusions, viruses, spam, and other malicious applications or threats on or to networks and computers, to promote network efficiency, security and integrity
Computer hardware; wide area and local area network hardware, firmware and software, for managing, monitoring and maintaining networks and firewalls to promote network efficiency, security, and integrity, and for the analysis and reporting of network information, data and traffic
Class 009: computer network gateway hardware and software for enabling computer gateway services, namely, for providing network security, network management, processing of network traffic, provision of network security based applications and application enhancement
Class 009: computer network operating system featuring network security, network management, processing of network traffic, provision of network security based applications and application enhancement
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.