Computer hardware and recorded and downloadable software for building and deploying solutions that transfer data between computer networks; computer hardware and recorded and downloadable software for implementing security mechanisms to ensure the confidentiality, integrity, availability, and source/destination authentication that transfer data between computer networks; computer hardware and recorded and downloadable software for inspecting and filtering data, files, and emails; computer hardware and recorded and downloadable software for blocking and control of computer malicious software and viruses; computer hardware and recorded and downloadable software for detecting malicious software in data, files, and emails; computer hardware and recorded and downloadable software for removing malicious software from data, files, and emails; computer hardware and recorded and downloadable software for sanitizing data, files, and emails; computer hardware and recorded and downloadable software for repairing data, files, and emails from which malicious software has been removed; computer hardware and recorded and downloadable software for the transmission of data, files, and emails; computer hardware and recorded and downloadable software for inspecting, filtering, sanitizing, and rebuilding data, files, and emails; computer hardware in the nature of digital networking firewall.
Zero client computers; a zero client computing device or thin client computing device implementing zero trust capabilities; zero client software; computer software implementing zero trust capabilities running on an end-user computing platform; desktop computers; zero trust zero client computers; zero trust thin client computers; thin client computers; ultra-thin client computers; notebook and laptop computers; desktop or mobile computing devices for enabling secure connections to a compute resource on a network providing integrated credential and user identity information, data separation, privileged access, authentication, and network access controls to implement and optimize computer network security and continuous authorized user verification; desktop or mobile computing device or software that securely accesses multiple and differing information system domains.
Computer hardware and peripheral devices; Computer hardware and software for setting up and configuring local area networks; Computer hardware and software for setting up and configuring wide area networks; Computer hardware, namely, firewalls; Computer network adapters, switches, routers and hubs; Computer network interface devices; Computer network-attached storage (NAS) hardware; Computer networking hardware; Computer servers; Computer software and firmware for multifactor authentication of user identification; Computer software and hardware for running computer software programs in a cloud-based environment, namely, computer software and hardware for controlling and managing virtual and non-virtual software; Computer software for administration of computer networks; Computers; Gateway routers in the nature of computer control hardware; Telecommunications and data networking hardware, namely, devices for transporting and aggregating voice, data, and video communications across multiple network infrastructures and communications protocols; VPN (virtual private network) hardware; VPN (virtual private network) operating software; "CLOUD"
Class 009: computer software used in the field of computer networks and gateways for data transfers; computer hardware used in the field of computer networks and gateways for data transfers; computer hardware; computer network switches, routers, hubs, bridges, firewalls, Ethernet and network repeaters; PCMCIA, CardBus, PCI, memory cards and bus cards; computer chips, processor chips, and computer storage medium, namely, disk drives, memory drives, flash drives and solid state drives; and operational and application software for all the aforesaid goods
Computer middleware for use in the development of secure computer systems; high-assurance communications middleware programs for high robustness separation of computer network communications and high-assurance control of information flows throughout the computer network; secure high-performance communications software middleware product for distributed software applications and/or systems; computer middleware developed for embedded systems, enterprise servers, workstations and global networks, for use in providing off-the-shelf, high-assurance communications security on computer networks and instructional manuals sold as a unit therewith
Object oriented computer middleware for use in software application development; object request broker (orb) program development middleware, software, tools and utilities for use in writing and implementing computer programs using orb technology; computer middleware and software that enables software developers to simplify the development of distributed software applications, build scalable, efficient and robust applications, and reduce overall development time meeting time-to-market requirements; and instructional manuals sold as a unit therewith
COMPUTER SOFTWARE FOR MICROCOMPUTER AND MINI-COMPUTER BASED DEVELOPMENT OF CLIENT/SERVER APPLICATIONS AND ASSOCIATED USER MANUALS DISTRIBUTED THEREWITH
computer software for microcomputer and mini-computer based development of client/server applications and associated user manuals distributed therewith
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.