Downloadable computer security software for use in monitoring of computer systems to detect unauthorized access or data breach, monitoring of computer systems operation by remote access, computer security threat analysis for protecting data; Downloadable application software for computer security for use in monitoring of computer systems to detect unauthorized access or data breach, monitoring of computer systems operation by remote access, computer security threat analysis for protecting data; Downloadable and recorded computer software for providing security to networks by monitoring of computer systems to detect unauthorized access or data breach, monitoring of computer systems operation by remote access, computer security threat analysis for protecting data; Downloadable and recorded computer software for data processing; Downloadable and recorded security software for use in monitoring of computer systems to detect unauthorized access or data breach, monitoring of computer systems operation by remote access, computer security threat analysis for protecting data; Downloadable and recorded computer software for use in managing secure electronic transactions; Downloadable and recorded computer software for monitoring internet websites; Downloadable and recorded computer software for computer security for use in monitoring of computer systems to detect unauthorized access or data breach, monitoring of computer systems operation by remote access, computer security threat analysis for protecting data | Development of IT security software; Data security consultancy; Data security services, namely, monitoring of computer systems to detect unauthorized access or data breach, monitoring of computer systems operation by remote access, computer security threat analysis for protecting data; Updating and rental of software for data processing; Development of computer systems for the processing of data; Database design and development; Development of computer software for security management; Software as a service (SaaS) services featuring computer software for use in database management for use in the field of data security, data analysis, data management, data processing, and big data processing; Platform as a service (PaaS) featuring computer software platforms for use in database management for use in the field of data security, data analysis, data management, data processing, and big data processing; Software design and development; Software customisation services; Design and development of Internet security programs; Internet security consultancy; Providing computer technology information services relating to the application of computer networks; Computer security system monitoring to detect unauthorized access or data breach; Updating of computer software; Computer programming; Computer security consultancy
Computer security services for networks and the internet, namely, monitoring of computer systems to detect unauthorized access or data breach, monitoring of computer systems operation by remote access, computer security threat analysis for protecting data; Providing technological information relating to networks and the internet; Development and maintenance of database systems; Design services for data processing computer software systems; Development of computer software for security management; Platform as a service (PAAS) featuring computer software platforms for use in database management for use in the field of data security, data analysis, data management, data processing, and big data processing; Software as a service (SAAS) services featuring computer software for use in database management for use in the field of data security, data analysis, data management, data processing, and big data processing; Software design and development; Updating of software and database systems; Design and development of Internet security computer software programs; Computer programming
Downloadable computer software for security of network, the internet and computer; Recorded computer software for security of network, the internet and computer; Downloadable computer software for data processing; Recorded computer software for data processing; Downloadable and recorded computer software for security of network, the internet and computer to prevent suspicious crypto transactions from both potential threats from dark webs and already known threats from the internet for use on cellular phones and tablet computers; Downloadable computer software for security of online trading; Recorded computer software for security of online trading; Downloadable computer software for internet web site monitoring; Recorded computer software for internet web site monitoring; Downloadable and recorded computer software for security of network, the internet and computer to prevent suspicious crypto transactions from both potential threats from dark webs and already known threats from the internet
Class 042: Computer security services for networks and the internet; providing information relating to networks and the internet; development and maintenance of databases; design services for data processing systems; development of computer software for security management; platform as a service [PaaS]; software as a service [SaaS]; software design and development; updating of software and database; providing internet security programs; computer programming
Downloadable computer software for security of network, the internet and computer; Recorded computer software for security of network, the internet and computer; Downloadable computer software for data processing; Recorded computer software for data processing; Downloadable and recorded computer software platforms for security of network, the internet and computer to provide users with up-to-date analytic information on potential threats from hidden channels, dark webs, deep webs, and social media for use of cellular phones and tablet computers; Downloadable computer software for security of online trading; Recorded computer software for security of online trading; Downloadable computer software for internet web site monitoring; Recorded computer software for internet web site monitoring; Downloadable and recorded computer software platforms for security of network, the internet and computer to provide users with up-to-date analytic information on potential threats from hidden channels, dark webs, deep webs, and social media