Class 042: Software as a service (SAAS) services featuring software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Class 042: Software as a service (SAAS) services featuring software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Software as a service (SAAS) services featuring software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Software as a service (SAAS) services featuring software for for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; "PLATFORM"; Computer security services, namely, security intelligence in the nature of monitoring of computer systems for detecting unauthorized access for protecting data and information for security purposes; Computer security services, namely, development of customized software for others for use in risk assessment in the field of security threat analysis for protecting computer networks from unauthorized access; Providing online non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; Providing resources, namely, providing information and consulting services in the fields of software design and technology support in the nature of detecting, analyzing and troubleshooting computer software problems
Downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; "THREAT"; Computer security services, namely, security intelligence in the nature of monitoring of computer systems for detecting unauthorized access for protecting data and information for security purposes; Computer security services, namely, development of customized software for others for use in risk assessment in the field of security threat analysis for protecting computer networks from unauthorized access; Providing online non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling computer software updates, computer systems management, computer message management, backup and recovery of computer systems, management of computer system performance reports, computer system security management, computer system data access, application development, machine learning intelligence, monitoring computer security threats, and for sharing and accessing security expertise information in the field of security threat analysis for protecting computer cloud, networks, applications and endpoints in on-premises, hybrid and cloud environments; Providing resources, namely, providing information and consulting services in the fields of software design and technology support in the nature of detecting, analyzing and troubleshooting computer software problems
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; "CYBERSECURITY"; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Downloadable and recorded computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Providing online, non-downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; providing resources, namely, information and consulting in the field of software design and technology support in the nature of troubleshooting of computer software problems
Downloadable computer software for managing, monitoring and organizing information technology infrastructure, systems management, performance management, security management, data access, batch management, job scheduling and cross platform automation | Providing temporary use of online non-downloadable software for managing, monitoring and organizing information technology infrastructure, systems management, performance management, security management, data access, batch management, job scheduling and cross platform automation
Downloadable computer software, namely, downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
Downloadable computer software, namely, downloadable software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
Downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
Administration of a customer loyalty program; providing a website featuring information about software; providing a website facilitating a web-based community where consumers can communicate, share ideas, promote products and services and provide feedback, namely, providing a website featuring recommendations, ratings and reviews posted by consumers about service providers and products in the field of computer hardware and software for commercial purposes
Downloadable computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development | Technical support services, namely, troubleshooting computer software problems
Software for providing network security and penetration testing services; computer software for exploiting and conducting post-exploitation efforts of vulnerabilities discovered in a target computer network; computer software for the automation of repeatable penetration test exploit techniques; computer software for conducting penetration tests for computer terminals, services, networks and end points for determining and identifying information security exploits; software for identifying vulnerability trends and tracking vulnerabilities identified by manual testing and other assurance activities, namely, penetration tests, code reviews, and threat modeling; Providing network security and penetration testing services; update, installation and maintenance of computer security software; providing online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computer and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, computer incident response, network incident response, and forensics and penetration testing
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; computer software for use to compile, manage, encrypt and store personal information; computer software for use to access, collect and modify network user identification; computer software for workflow, helpdesk and network security management; computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; computer software for registering and authenticating digital certificates; computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; "NETWORK"; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; "ACCESS"; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; "ACCESS"; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
Class 009: Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions; Class 042: Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network
software, namely, a managed file transfer software solution for streamlining and auditing the exchange of data between systems, employees, customers and trading partners
Computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development
Computer software, namely, software for managing, monitoring and organizing information technology infrastructure, scheduling, systems management, message management, backup and recovery, report management, performance management, security management, data access, application development; Technical support services, namely, troubleshooting of computer software problems
Class 009: [ Software, namely, software that protects the exchange of data and provides for the automation of data movement ]; Class 042: Design and development of software
Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization
Computer software for use in monitoring business operations and to capture and disseminate business information on global and internal computer networks for use by business organizations as it relates to the management of a business
Computer software for use in monitoring business operations and to capture and disseminate business information on global and internal computer networks for use by business organizations as it relates to the management of a business
Computer software for use in monitoring business operations and to capture and disseminate business information on global and internal computer networks for use by business organizations as it relates to the management of a business
Computer programs for interfacing personal computers to larger capacity computers in order to make greater capacity databases accessible for use and update by personal computers, and manuals therefor sold as a unit
Computer programs and features and modules thereof used in computer capacity planning and computer modeling and in gathering, measuring, analyzing and reporting computer system performance data
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within; computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
Computer consultation services, namely computer software design and development for others in the field of computer security; security printing, namely encoding identification on valuable documents and products
COMPUTER SOFTWARE, NAMELY SOFTWARE THAT PROVIDES NETWORK SECURITY FOR COMPUTER SYSTEMS | COMPUTER EDUCATION AND TRAINING THROUGH SEMINARS AND THROUGH HANDS-ON COURSES RELATING TO USE OF COMPUTER SYSTEMS, COMPUTER PROGRAMMING, AND COMPUTER NETWORK SECURITY | COMPUTER CONSULTING RELATING TO MANAGEMENT OF COMPUTER SYSTEMS AND TECHNICAL CONSULTING relating TO SERVERS AND COMPUTER SYSTEMS
Network monitoring software for detecting failures and operational problems in a computer network, and for reporting to a network administrator for action in the field of network maintenance