Class 042: providing temporary use of on-line non-downloadable cloud-computing software for managing the execution of guest computer operating systems; providing temporary use of on-line non-downloadable cloud-computing software for desktop virtualization
Class 042: providing temporary use of on-line non-downloadable cloud-computing software for managing the execution of guest computer operating systems; providing temporary use of on-line non-downloadable cloud-computing software for desktop virtualization
Class 042: science and technology services, in particular, scientific research, analysis, and testing in the field of electronic data processing; industrial analysis of industrial computer programming and computer system analysis and research services in the field of information and telecommunication technology; design and development of computer hardware and software and technological services relating thereto, namely, technological planning and consulting services in the field of computer hardware systems and computer software; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating data protection software in the nature of security information and event management (SIEM), security orchestration, automation, and response (SOAR), identity and access management (IAM), unified endpoint management, secure service edge (SSE), secure access service edge (SASE), to ensure computer security, cybersecurity, information technology security, and endpoint security; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating computer and information technology security software to ensure data protection, security policy compliance, computer security, cybersecurity, information technology security, and endpoint security; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating software featuring a zero trust security framework; computer security consultancy; information technology security consultancy; cybersecurity consultancy
Class 042: science and technology services, in particular, scientific research, analysis, and testing in the field of electronic data processing; industrial analysis of industrial computer programming and computer system analysis and research services in the field of information and telecommunication technology; design and development of computer hardware and software and technological services relating thereto, namely, technological planning and consulting services in the field of computer hardware systems and computer software; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating data protection software in the nature of security information and event management (SIEM), security orchestration, automation, and response (SOAR), identity and access management (IAM), unified endpoint management, secure service edge (SSE), secure access service edge (SASE), to ensure computer security, cybersecurity, information technology security, and endpoint security; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating computer and information technology security software to ensure data protection, security policy compliance, computer security, cybersecurity, information technology security, and endpoint security; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating software featuring a zero trust security framework; computer security consultancy; information technology security consultancy; cybersecurity consultancy
Class 042: computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating data protection software in the nature of security information and event management (SIEM), security orchestration, automation, and response (SOAR), identity and access management (IAM), unified endpoint management, secure service edge (SSE), secure access service edge (SASE), to ensure computer security, cybersecurity, information technology security, and endpoint security; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating computer and information technology security software to ensure data protection, security policy compliance, computer security, cybersecurity, information technology security, and endpoint security; computer security services, namely, restricting unauthorized access to computer networks by integrating and orchestrating software featuring a zero trust security framework; computer security consultancy; information technology security consultancy; cybersecurity consultancy
Class 009: downloadable computer operating system software; downloadable software for computer security, device security, cybersecurity, information technology security, endpoint security, computer network security, and computer software application security; downloadable software for user and device authentication; Class 042: providing temporary use of on-line non-downloadable cloud computing software for secure computer operating systems; providing temporary use of on-line non-downloadable software for computer security, device security, cybersecurity, information technology security, endpoint security, computer network security, and computer software application security; providing temporary use of on-line non-downloadable software for user and device authentication
Class 009: downloadable computer operating system software; downloadable software for computer security, device security, cybersecurity, information technology security, endpoint security, computer network security, and computer software application security; downloadable software for user and device authentication; Class 042: providing temporary use of on-line non-downloadable cloud computing software for secure computer operating systems; providing temporary use of on-line non-downloadable software for computer security, device security, cybersecurity, information technology security, endpoint security, computer network security, and computer software application security; providing temporary use of on-line non-downloadable software for user and device authentication
Class 009: downloadable software for analyzing, capturing, processing, and using data and telemetry data for performance monitoring of computer networks, computer software applications, computers and devices, error and event monitoring and reporting, security and compliance checking, device health monitoring, and device confidence level reporting
Class 009: downloadable software for user and device authentication; downloadable software for user and device authentication using identity, defined persona, and context to determine access; downloadable software for implementing least privilege access across computer networks, computer software applications, and electronic data; downloadable software for restricting unauthorized access to computer networks, computer software applications, and electronic data; downloadable software for restricting unauthorized access to computer networks, computer software applications, and electronic data by integrating and orchestrating user and device authentication software of others and identity decision-making and policy decision-making software of others; Class 042: providing temporary use of on-line non-downloadable software for user and device authentication; providing temporary use of on-line non-downloadable software for user and device authentication using identity, defined persona, and context to determine access; providing temporary use of on-line non-downloadable software for implementing least privilege access across computer networks, computer software applications, and electronic data; providing temporary use of on-line non-downloadable software for restricting unauthorized access to computer networks, computer software applications, and electronic data; providing temporary use of on-line non-downloadable software restricting unauthorized access to computer networks, computer software applications, and electronic data by integrating and orchestrating user and device authentication software of others and identity decision-making and policy decision-making software of others; computer security services, namely, restricting unauthorized access to computer networks, computer software applications, and electronic data; computer security services, namely, restricting unauthorized access to computer networks, computer software applications, and electronic data by integrating and orchestrating user and device authentication software of others and identity decision-making and policy decision-making software of others
Class 042: providing an Internet website portal featuring a centralized location for users to build, develop, manage, and distribute software applications
Class 042: providing an Internet website portal featuring a centralized location for users to find, import, and download, install, and uninstall third party software applications
Class 042: providing temporary use of on-line non-downloadable cloud-computing software for managing the execution of guest computer operating systems; providing temporary use of on-line non-downloadable cloud-computing software for desktop virtualization
Class 042: providing temporary use of on-line non-downloadable cloud-computing software for managing the execution of guest computer operating systems; providing temporary use of on-line non-downloadable cloud-computing software for desktop virtualization
downloadable computer operating system software; providing temporary use of on-line non-downloadable cloud computing software for secure computer operating systems
downloadable secure computer operating system software; downloadable computer software, namely, software for computer operating system management Downloadable computer software, namely, software for running computer operating system, software for controlling computers, data processing software, data management software, operating system programs, and network LAN (local area network) operating programs; Downloadable computer software, namely, safety, diagnostic and management programs for computers, namely for security threat analysis, protecting data, running diagnostics, and data management; Downloadable computer software, namely, software for the control, administration and analysis of mobile and stationary endpoint devices, electronic machines, cameras and sensors; Downloadable computer software, namely, embedded operating system software, security and authentication software, computer management and administration software, interface management software and software for data transfer; Downloadable computer software applications and tools for software deployment and software updates and upgrades, software for optimization to increase the performance and availability of devices, and software for developing and integration of software libraries and device drivers; science and technology services, in particular, scientific research, analysis, and testing in the field of electronic data processing; Industrial analysis of industrial computer programming and computer system analysis and research services in the field of information and telecommunication technology; Design and development of computer hardware and software and technological services relating thereto, namely, technological planning and consulting services in the field of computer hardware systems and computer software; computer services, namely, integrating and orchestrating desktop experience, security information and event management (SIEM), security orchestration, automation, and response (SOAR), identity and access management (IAM), unified endpoint management, secure service edge (SSE), secure access service edge (SASE), and data protection products of others to ensure computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating computer and information technology security products to ensure data protection, security policy compliance, computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating the products of others to ensure a zero trust security framework; computer security consultancy; information technology security consultancy; cybersecurity consultancy
science and technology services, in particular, scientific research, analysis, and testing in the field of electronic data processing; Industrial analysis of industrial computer programming and computer system analysis and research services in the field of information and telecommunication technology; Design and development of computer hardware and software and technological services relating thereto, namely, technological planning and consulting services in the field of computer hardware systems and computer software; computer services, namely, integrating and orchestrating desktop experience, security information and event management (SIEM), security orchestration, automation, and response (SOAR), identity and access management (IAM), unified endpoint management, secure service edge (SSE), secure access service edge (SASE), and data protection products of others to ensure computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating computer and information technology security products to ensure data protection, security policy compliance, computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating the products of others to ensure a zero trust security framework; computer security consultancy; information technology security consultancy; cybersecurity consultancy
science and technology services, in particular, scientific research, analysis, and testing in the field of electronic data processing; Industrial analysis of industrial computer programming and computer system analysis and research services in the field of information and telecommunication technology; Design and development of computer hardware and software and technological services relating thereto, namely, technological planning and consulting services in the field of computer hardware systems and computer software; computer services, namely, integrating and orchestrating desktop experience, security information and event management (SIEM), security orchestration, automation, and response (SOAR), identity and access management (IAM), unified endpoint management, secure service edge (SSE), secure access service edge (SASE), and data protection products of others to ensure computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating computer and information technology security products to ensure data protection, security policy compliance, computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating the products of others to ensure a zero trust security framework; computer security consultancy; information technology security consultancy; cybersecurity consultancy
science and technology services, in particular, scientific research, analysis, and testing in the field of electronic data processing; Industrial analysis of industrial computer programming and computer system analysis and research services in the field of information and telecommunication technology; Design and development of computer hardware and software and technological services relating thereto, namely, technological planning and consulting services in the field of computer hardware systems and computer software; computer services, namely, integrating and orchestrating desktop experience, security information and event management (SIEM), security orchestration, automation, and response (SOAR), identity and access management (IAM), unified endpoint management, secure service edge (SSE), secure access service edge (SASE), and data protection products of others to ensure computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating computer and information technology security products to ensure data protection, security policy compliance, computer security, cybersecurity, information technology security, and endpoint security; computer services, namely, integrating and orchestrating the products of others to ensure a zero trust security framework; computer security consultancy; information technology security consultancy; cybersecurity consultancy
Downloadable computer software, namely, software for running computer operating system, software for controlling computers, data processing software, data management software, operating system programs, and network LAN (local area network) operating programs; Downloadable computer software, namely, safety, diagnostic and management programs for computers for security threat analysis, protecting data, running diagnostics, and data management; Downloadable computer software, namely, software for the control, administration and analysis of mobile and stationary endpoint devices, electronic machines, cameras and sensors; Downloadable computer software, namely, embedded operating system software, security and authentication software, computer management and administration software, interface management software and software for data transfer; Downloadable computer software applications and tools for software deployment and software updates and upgrades, software for optimization to increase the performance and availability of devices, and software for developing and integration of software libraries and device drivers; Wholesale store services featuring computer software; Retail store services featuring computer software; Technological research in the field of electronic data processing; Research in the field of computer operating systems; Design and development of computer software; Computer services, namely, remote troubleshooting of computer hardware and software problems; Technological planning and consulting services in the field of computer hardware systems and computer software systems
Conducting business conferences in the fields of end user computing, computer endpoint management and security, cybersecurity, and digital transformation; Conducting trade shows in the fields of end user computing, computer endpoint management and security, cybersecurity, and digital transformation
Conducting business conferences in the fields of end user computing, computer endpoint management and security, cybersecurity, and digital transformation; Conducting trade shows in the fields of end user computing, computer endpoint management and security, cybersecurity, and digital transformation
Science and technology services, in particular in the field of electronic data processing; Industrial analysis and research services; Design and development of computer hardware and software and technological services relating thereto
Science and technology services, in particular, scientific research, analysis, and testing in the field of electronic data processing;
Industrial analysis of industrial computer programming and computer system analysis and research services in the field of
information and telecommunication technology; Design and development of computer hardware and software and technological
services relating thereto, namely, technological planning and consulting services in the field of computer hardware systems and
computer software
Data processing apparatus and computers, in particular peripheral devices, computer terminals, input and output devices for computers, network components for electronic data processing and transmission in the nature of Network access server hardware, Network routers, Computer network bridges, memories for data processing equipment, integrated circuit cards, interfaces for computers; Downloadable software and recorded software, in particular application programs for controlling computers, data processing, data management, operating system programs, network LAN (local area network) operating programs, safety, diagnostic and management programs for computers, namely for security threat analysis for protecting data, running diagnostics, data management; Marketing services in the field of computer hardware, software and computer services; commercial services in the field of computer cases and software, namely, Negotiation and conclusion of commercial transactions for third parties, Providing an on-line commercial information directory on the internet, Commercial evaluation and rating of consumer goods for others prior to purchase; Scientific and technological services, namely, scientific research, analysis, testing in particular in the field of electronic data processing; industrial analysis and research services in the field of in the field of computer operating systems; design and development of computer hardware and software and technological services relating thereto namely, Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts, Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems, Computer technology support services, namely, help desk services
Data processing apparatus and computers, in particular peripheral devices, computer terminals, input and output devices for computers, network components for electronic data processing and transmission in the nature of Network access server hardware, Network routers, Computer network bridges, memories for data processing equipment, integrated circuit cards, interfaces for computers; Downloadable software and recorded software, in particular application programs for controlling computers, data processing, data management, operating system programs, network LAN (local area network) operating programs, safety, diagnostic and management programs for computers, namely for security threat analysis for protecting data, running diagnostics, data management; Marketing services in the field of computer hardware, software and computer services; commercial services in the field of computer cases and software, namely, Negotiation and conclusion of commercial transactions for third parties, Providing an on-line commercial information directory on the internet, Commercial evaluation and rating of consumer goods for others prior to purchase; Scientific and technological services, namely, scientific research, analysis, testing in particular in the field of electronic data processing; industrial analysis and research services in the field of in the field of computer operating systems; design and development of computer hardware and software and technological services relating thereto namely, Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts, Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems, Computer technology support services, namely, help desk services
Computer programs and software, namely, application software for the control, administration and analysis of mobile and stationary endpoint devices, electronic machines, cameras and sensors, in particular embedded operating system software, security and authentication software, management and administration software, software interfaces and software platforms for data transfer, applications and tools for software deployment and updates/upgrades, software for optimization and increase the performance and availability of devices, and for developing and integration of software libraries and device drivers
Scientific and technological services, namely, research and design in the field of electronic data processing; industrial analytic and research services in the field of industrial computer operating systems; design and development of computer hardware and software and related technical services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
Data processors; central processing units for processing data; computer chip set for use in processing data to and from a central processing unit; interface cards for data processing equipment in the form of printed circuits; computer software for application and database integration; network access server operating software; computer software for ensuring the secure access to local area networks; and computer software for the administration of computer local area networks and the detection of computer security virus threats; Scientific and technological research and design for others in the field of electronic data processing; technical research and consultation in the field of industrial computer operating systems; and design and development of computer hardware and software for multimedia products
COMPUTER PERIPHERAL EQUIPMENT; COMPUTER TERMINALS; COMPUTER OUTPUT AND INPUT DEVICES AS COMPONENTS OF COMPUTER PERIPHERAL EQUIPMENT AND COMPUTER TERMINALS; AND COMPUTERS AND NETWORK COMPONENTS AS END PRODUCTS FOR OPERATING LOCAL AREA NETWORKS (LANS) AND WIDE AREA NETWORKS (WANS)
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.