Class 042: Design and development of computer software; Software as a service (SAAS) services featuring software for the programming of computer software for others; Software as a service (SAAS) services featuring software for the installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for the monitoring of computer security systems; Software as a service (SAAS) services featuring software for the monitoring of computer system operation by remote access; Software as a service (SAAS) services featuring software for the monitoring of computer systems to detect cybersecurity incidents; Software as a service (SAAS) services featuring software for monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SAAS) services featuring software for the auditing of the security of firewalls, switches and routers to detect risks to computer networks; Software as a service (SAAS) services featuring software for assessment of the security status of a computer network; Software as a service (SAAS) services featuring software for the provision of detailed device specific remediation advice; Software as a service (SAAS) services featuring software for the provision of technical fixes for misconfigurations to ensure computer networks are secure and compliant; Software as a service (SAAS) services featuring software for the identification of vulnerabilities within computer networks; Software as a service (SAAS) services featuring software for improving cyber hygiene using technology that provides network assurance and resilience; Programming of computer software for others; Installation, maintenance and repair of computer software; Computer security consultancy; Monitoring of computer system operation by remote access; Monitoring of computer systems to detect cybersecurity incidents; Monitoring of computer systems for detecting unauthorized access or data breach; Computer network security consultancy; Computer security consultancy in the field of IT security, protection and restoration; Providing on-line non-downloadable software for the auditing of the security of firewalls, switches and routers to detect risks to computer networks; Providing on-line non-downloadable software for the assessment of the security status of a computer network; Providing on-line non-downloadable software for the provision of detailed device specific remediation advice; Providing on-line non-downloadable software for the provision of technical fixes for misconfigurations to ensure computer networks are secure and compliant; Providing on-line non-downloadable software for the identification of vulnerabilities within computer networks; Providing on-line non-downloadable software for improving cyber hygiene using technology that provides network assurance and resilience; none of the foregoing for use within the fields of writing insurance policies, insurance management, insurance data analytics, insurance risk management, insurance quotes and insurance binding, issuing and managing insurance policies, and managing and analyzing insurance policy information and insurance policyholder information for use by insurance agencies, insurance brokers, and insurance carriers
Downloadable computer software for the administration, monitoring, management, assessment, analysis and quantification of security and data breach vulnerability risks; downloadable computer software for providing virtual security functions; downloadable computer software for monitoring, management and analysis of information technology (it) infrastructure, systems, networks, servers, computer devices and applications for security; Computer security threat analysis for protecting data; Computer security consultancy; Computer security consultancy in the field of remote and on-line system monitoring, monitoring of the information technology (it) infrastructure, systems, networks, servers, computer devices and applications of others to ensure proper functioning, and scanning and penetration testing of computers and networks to assess information security vulnerability; Software as a service (SAAS) services featuring software for remote and on-line system computer security monitoring, monitoring of the information technology (it) infrastructure, systems, networks, servers, computer devices and applications of others to ensure proper functioning, and scanning and penetration testing of computers and networks to assess information security vulnerability
DOWNLOADABLE COMPUTER SOFTWARE FOR THE ADMINISTRATION, MONITORING, MANAGEMENT, ASSESSMENT, ANALYSIS AND QUANTIFICATION OF SECURITY AND DATA BREACH VULNERABILITY RISKS; DOWNLOADABLE COMPUTER SOFTWARE FOR PROVIDING VIRTUAL SECURITY FUNCTIONS; DOWNLOADABLE COMPUTER SOFTWARE FOR MONITORING, MANAGEMENT AND ANALYSIS OF INFORMATION TECHNOLOGY (IT) INFRASTRUCTURE, SYSTEMS, NETWORKS, SERVERS, COMPUTER DEVICES AND APPLICATIONS FOR SECURITY; COMPUTER NETWORK SECURITY SERVICES, NAMELY, REMOTE AND ON-LINE SYSTEM MONITORING, MONITORING OF THE INFORMATION TECHNOLOGY (IT) INFRASTRUCTURE, SYSTEMS, NETWORKS, SERVERS, COMPUTER DEVICES AND APPLICATIONS OF OTHERS TO ENSURE PROPER FUNCTIONING; COMPUTER NETWORK SECURITY SERVICES, NAMELY, SCANNING AND PENETRATION TESTING OF COMPUTERS AND NETWORKS TO ASSESS INFORMATION SECURITY VULNERABILITY
DOWNLOADABLE COMPUTER SOFTWARE FOR THE ADMINISTRATION, MONITORING, MANAGEMENT, ASSESSMENT, ANALYSIS AND QUANTIFICATION OF SECURITY AND DATA BREACH VULNERABILITY RISKS; DOWNLOADABLE COMPUTER SOFTWARE FOR PROVIDING VIRTUAL SECURITY FUNCTIONS; DOWNLOADABLE COMPUTER SOFTWARE FOR MONITORING, MANAGEMENT AND ANALYSIS OF INFORMATION TECHNOLOGY (IT) INFRASTRUCTURE, SYSTEMS, NETWORKS, SERVERS, COMPUTER DEVICES AND APPLICATIONS FOR SECURITY; COMPUTER NETWORK SECURITY SERVICES, NAMELY, REMOTE AND ON-LINE SYSTEM MONITORING, MONITORING OF THE INFORMATION TECHNOLOGY (IT) INFRASTRUCTURE, SYSTEMS, NETWORKS, SERVERS, COMPUTER DEVICES AND APPLICATIONS OF OTHERS TO ENSURE PROPER FUNCTIONING; COMPUTER NETWORK SECURITY SERVICES, NAMELY, SCANNING AND PENETRATION TESTING OF COMPUTERS AND NETWORKS TO ASSESS INFORMATION SECURITY VULNERABILITY
COMPUTER SOFTWARE FOR THE ADMINISTRATION, MONITORING, MANAGEMENT, ASSESSMENT, ANALYSIS AND QUANTIFICATION OF SECURITY AND DATA BREACH VULNERABILITY RISKS; COMPUTER SOFTWARE FOR PROVIDING VIRTUAL SECURITY FUNCTIONS; COMPUTER SOFTWARE FOR MONITORING, MANAGEMENT AND ANALYSIS OF INFORMATION TECHNOLOGY (IT) INFRASTRUCTURE, SYSTEMS, NETWORKS, SERVERS, COMPUTER DEVICES AND APPLICATIONS FOR SECURITY; COMPUTER SOFTWARE AND NETWORK SECURITY MANAGEMENT AND ANALYSIS, NAMELY, REMOTE AND ON-LINE SYSTEM MONITORING, MANAGEMENT AND ANALYSIS OF THE INFORMATION TECHNOLOGY (IT) INFRASTRUCTURE, SYSTEMS, NETWORKS, SERVERS, COMPUTER DEVICES AND APPLICATIONS OF OTHERS; COMPUTER NETWORK SECURITY MANAGEMENT AND ANALYSIS, NAMELY, SCANNING AND PENETRATION TESTING OF COMPUTERS AND NETWORKS TO ASSESS INFORMATION SECURITY VULNERABILITY; COMPUTER CONSULTING SERVICES RELATING TO NETWORK SECURITY MANAGEMENT AND ANALYSIS