TREND MICRO KABUSHIKI KAISHA
62 Marks
First Filed:Feb 28, 2005Latest Filed:Mar 24, 2026Address:4-1-6 Shinjuku, Shinjuku-ku, Tokyo, 160-0022, JP
Portfolio Overview
Registered
22(35%)Pending
9(15%)Dead
31(50%)Previous
15Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchClass 41
Education and EntertainmentTTAB Proceedings
Total Proceedings
84As Plaintiff
81(96%)As Defendant
3(4%)Top Firms
Carr & Ferrell LLP(Jan 2026)
65
Muncy, Geissler, Olds & Lowe...(Mar 2021)
9
Trademark Activity Timeline(2005 – 2026)
- Filings
- Registrations
Trademark Portfolio
77 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
62
15
Status
37
9
13
18
0
Mark Type
65
1
3
8
0
58
3
2
1
1
Goods & Services
Class 009: Downloadable and recorded computer security software; downloadable computer software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; downloadable and recorded computer software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; downloadable computer software for protecting and securing public, private, and hybrid cloud deployments; downloadable computer software for network intrusion detection and prevention; downloadable computer software for email security and identity security; downloadable computer software for preventing leakage of confidential information; downloadable computer software to monitor, report and enforce regulatory compliance; downloadable firewall computer software; downloadable computer software for data backup and recovery; downloadable computer software for securing computer data and other computer software; downloadable computer utility software; downloadable application software for smartphones; downloadable computer software for protecting artificial intelligence (AI) stack, including AI systems, software andworkloads from security threats, security vulnerabilities, and unauthorized access; downloadable computer software using artificial intelligence (AI) for computer, software, and network security; downloadable computer software using large language models (LLMs) for computer, software, and network security; downloadable computer softwarefor artificial generation of human speech and text; downloadable image files for restoration of systems and software; recorded computer security and operating software; computer hardware; computer peripherals; computer accessories; computer hardware that integrates and manages security functions to protect computer networks from threats such as computer viruses and unauthorized intrusions; computer hardware and software to protect and enhance data confidentiality; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; computer hardware and software to protect and restore the perfect condition of data, computer, computer software, and computer network; computer software and electronic publications to inform and educate computer users about computer and network security; downloadable electronic publications in the fields of computer software and computer security; computer hardware in the nature of network appliances; downloadable mobile applications using artificial intelligence (AI); computer software; recorded computer software using artificial intelligence (AI); Class 035: Providing an incentive program for computer software security investigators who are responsible for disclosing vulnerabilities in computer software used by the enterprise; online retail store services featuring computer software; online retail store services; Class 041: Providing electronic publications; educational and training services relating to computer security; educational examination and certification services in the field of computer security, data security, and network security technologies; computer education training; training services in the field of computer software development; training in the use and operation of computers; educational and instruction services in the field of computer software, firmware, hardware, electronic devices, data and network security and cybersecurity; educational and instruction services relating to operation of computer hardware; educational and instruction services relating to operation of computer software; educational and instruction services relating to computer viruses; providing a website featuring non-downloadable videos from the internet; organizing, arranging and conducting competitions; organizing, arranging and conducting incentive award programs; providing a website featuring blogs and non-downloadable publications in the nature of articles, news, alerts, advisories, reports and bulletins; publishing of educational articles, news, alerts, advisories, reports and bulletins; Class 042: Software as a Service (SAAS) services featuring computer security software; Software as a Service (SAAS) services featuring software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; Software as a Service (SAAS) services featuring software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; Software as a Service (SAAS) services featuring software for protecting and securing public, private, and hybrid cloud deployments; Software as a Service (SAAS) services featuring software for network intrusion detection and prevention; Software as a Service (SAAS) services featuring software for email security and identity security; Software as a Service (SAAS) services featuring software for preventing leakage of confidential information; Software as a Service (SAAS) services featuring software to monitor, report and enforce regulatory compliance; providing online non-downloadable software for backup and restoration of data; Software as a Service (SAAS) services featuring software for protecting the artificial intelligence (AI) stack, including AI systems, software and workloads from security threats, security vulnerabilities, and unauthorized access; providing an AI-powered enterprise cybersecurity platform featuring online software and professional services for proactive security, cyber risk exposure management, security operations, and robust layered protection; provision of threat intelligence information, including active attacks, threat actors, and proactive defense strategies; provision of Platform as a Service (PAAS) services for securing computers, data, and computer networks; providing temporary use of online non-downloadable software using artificial intelligence (AI) for computer, software, and network security; providing temporary use of online non-downloadable software using large language models (LLMs) for computer, software, and network security; providing on-line non-downloadable software for generating human sound and text artificially; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus computer software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs, data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer programs with a function of filtering emails; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing online non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; provision of computer program and information relating to computer viruses, their varieties, characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer virus; research and analysis of computer virus; provision of information relating to research and analysis of computer virus; advice for restoration of computer program’s operation and problems; advice relating to research and analysis of computer virus; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; installation of computer program; updating of computer software for others via computer and communication networks; updating of pattern file for computer virus; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus and provision of information thereof; design, creation, and maintenance of computer program; consultancy relating to design, creation, and maintenance of computer program; provision of information relating to design, creation, and maintenance of computer program; design, creation, and maintenance of information processing system for use with computer; consultancy rela
Goods & Services
Class 009: Downloadable and recorded computer security software; downloadable computer software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; Downloadable and recorded computer software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; downloadable computer software for protecting and securing public, private, and hybrid cloud deployments; downloadable computer software for network intrusion detection and prevention; downloadable computer software for email security and identity security; downloadable computer software for preventing leakage of confidential information; downloadable computer software to monitor, report and enforce regulatory compliance; downloadable firewall computer software; downloadable computer software for data backup and recovery; downloadable computer software for securing computer data and other computer software; downloadable computer utility software; downloadable application software for smartphones; downloadable computer software for protecting artificial intelligence (AI) stack, including AI systems, software and workloads from security threats, security vulnerabilities, and unauthorized access; downloadable computer software using artificial intelligence (AI) for computer, software, and network security; downloadable computer software using large language models (LLMs) for computer, software, and network security; downloadable computer software for artificial generation of human speech and text; downloadable image files for restoration of systems and software; recorded computer security and operating software; computer hardware; computer peripherals; computer accessories; computer hardware that integrates and manages security functions to protect computer networks from threats such as computer viruses and unauthorized intrusions; computer hardware and software to protect and enhance data confidentiality; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; computer hardware and software to protect and restore the perfect condition of data, computer, computer software, and computer network; computer software and electronic publications to inform and educate computer users about computer and network security; downloadable electronic publications in the fields of computer software and computer security; computer hardware in the nature of network appliances; downloadable mobile applications using artificial intelligence (AI); computer software; recorded computer software using artificial intelligence (AI); Class 035: Providing an incentive program for computer software security investigators who are responsible for disclosing vulnerabilities in computer software used by the enterprise; online retail store services featuring computer software; online retail store services; Class 041: Providing electronic publications; educational and training services relating to computer security; educational examination and certification services in the field of computer security, data security, and network security technologies; computer education training; training services in the field of computer software development; training in the use and operation of computers; educational and instruction services in the field of computer software, firmware, hardware, electronic devices, data and network security and cybersecurity; educational and instruction services relating to operation of computer hardware; educational and instruction services relating to operation of computer software; educational and instruction services relating to computer viruses; providing a website featuring non-downloadable videos from the internet; organizing, arranging and conducting competitions; organizing, arranging and conducting incentive award programs; providing a website featuring blogs and non-downloadable publications in the nature of articles, news, alerts, advisories, reports and bulletins; publishing of educational articles, news, alerts, advisories, reports and bulletins; Class 042: Software as a Service (SAAS) services featuring computer security software; Software as a Service (SAAS) services featuring software for securing computers, mobile devices, computer servers, computer networks, computer data and computer software; Software as a Service (SAAS) services featuring software for protecting computer hardware, computer software and computer data against viruses, malware, other security threats, and unauthorized access; Software as a Service (SAAS) services featuring software for protecting and securing public, private, and hybrid cloud deployments; Software as a Service (SAAS) services featuring software for network intrusion detection and prevention; Software as a Service (SAAS) services featuring software for email security and identity security; Software as a Service (SAAS) services featuring software for preventing leakage of confidential information; Software as a Service (SAAS) services featuring software to monitor, report and enforce regulatory compliance; providing on-line non-downloadable software for backup and restoration of data; Software as a Service (SAAS) services featuring software for protecting the artificial intelligence (AI) stack, including AI systems, software and workloads from security threats, security vulnerabilities, and unauthorized access; providing an AI-powered enterprise cybersecurity platform featuring online software and professional services for proactive security, cyber risk exposure management, security operations, and robust layered protection; provision of threat intelligence information, including active attacks, threat actors, and proactive defense strategies; provision of Platform as a Service (PAAS) services for securing computers, data, and computer networks; providing temporary use of online non-downloadable software using artificial intelligence (AI) for computer, software, and network security; providing temporary use of online non-downloadable software using large language models (LLMs) for computer, software, and network security; providing on-line non-downloadable software for generating human sound and text artificially; Providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus computer software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs, data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer programs with a function of filtering e-mails; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; provision of computer program and information relating to computer viruses, their varieties, characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer virus; research and analysis of computer virus; provision of information relating to research and analysis of computer virus; advice for restoration of computer program’s operation and problems; advice relating to research and analysis of computer virus; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; installation of computer program; updating of computer software for others via computer and communication networks; updating of pattern file for computer virus; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus and provision of information thereof; design, creation, and maintenance of computer program; consultancy relating to design, creation, and maintenance of computer program; provision of information relating to design, creation, and maintenance of computer program; design, creation, and maintenance of information processing system for use with computer; consultancy r
Goods & Services
Class 009: Downloadable computer programs and downloadable computer software for artificial generation of human speech and text; application software for smartphones; application software; computer hardware; computer hardware that integrates and manages security functions to protect computer networks from threats such as computer viruses and unauthorized intrusions; computers; computer utility software; firewall computer software; computer software for computer data security and other computer software; computer accessories; computer software for preventing leakage of confidential information; computer software and electronic publications to inform and educate computer users about computer and network security; computer software to monitor, report and enforce regulatory compliance; software for data backup and recovery; computer hardware and software to protect and enhance data confidentiality; computer hardware and software to protect or to restore the perfect condition of data, computer, computer software, computer network; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; electronic publications recorded on electronic circuits, magnetic disks, magnetic tapes, optical disks, and magneto-optical disks; other electronic publications; electronic circuits, magnetic disks, magnetic tapes, optical disks, magnetic-optical disks and other recording media recorded with computer programs; computer program; other electronic machines and apparatus and their parts; exposed cinematographic films; exposed slide films; slide film mounts; computer software, recorded; computer software for computer games; personal digital assistants; computer peripheral devices; USB flash drives; portable computer hardware; Class 041: Providing electronic publications; services of reference libraries for literature and documentary records; rental of records or sound-recorded magnetic tapes; rental of image-recorded magnetic tapes; educational services relating to computer security; examination and certification for security technology of computer system; educational training relating to computers; training in the field of computer software development; training in the use and operation of computers; educational and instruction services relating to arts, crafts, sports or general knowledge; educational services relating to operation of computer hardware; educational services relating to operation of computer software; educational services relating to computer virus; examination, certification and grant qualification related to computer security; arranging, conducting and organization of lecture, workshops [training] or seminars relating to computer virus or computer security; arranging and conducting of lecture, workshops [training] or seminars; providing videos from the internet; educational and training services relating to cyber security and information technology; organization of competitions; organization of ceremony to award incentives; provision of blogs, online journals and non-downloadable publications via websites; publication of articles, newsletters, warning letters, instructions, reports and summarized articles relating education; Class 042: Providing on-line non-downloadable software for generating human sound and text artificially; provision of software in relation to computer, data, network security by SaaS provider; provision of computer program for platform construction for provision of SaaS application; design or maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus computer software; providing on-line non-downloadable software for monitoring, filtering and reporting of message/files/programs/data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing computer programs with a function of filtering e-mails; provision of Internet search engines; update of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of computer program and information relating to computer viruses, their varieties, characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of vaccine software for computer virus; provision and rental of other computer program; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data (included what is performed by dispatch); provision of information in relation of restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program’s operation and problems; research and analysis of computer virus (included what is performed by dispatch); provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer program; update of pattern file for computer virus; update of other computer software; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus (included what is performed by dispatch) and provision of information thereof; design, creation, maintenance of computer program; consultancy relating to design, creation, maintenance of computer program; provision of information relating to design, creation, maintenance of computer program; design, creation, maintenance of information processing system used computer; consultancy relating to design, creation, maintenance of information processing system used computer; provision of information relating to design, creation, maintenance of information processing system used computer; provision of information relating to computer bug or updating; rental of access time to computer database; information processing by computer; design of machines, apparatus, instruments (including their parts) or systems and facility composed of such machines, apparatus and instruments; technological advices and introduction about performance and operation procedures of computers, automobiles and industrial machines which need to have an advanced and technical knowledge/technology/experience to operate appropriately (technological advice relating to computers, automobiles and industrial machines); testing or research on computer programs; testing or research on machine and apparatus; rental of computer (including CPU and electronic circuits, magnetic disks, magnetic tapes recorded with computer programs and other peripheral apparatus); provision of information about computer technology via website; provision of technological information about computer; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer r
Goods & Services
Providing electronic publications; reference libraries of literature and documentary records; rental of records or sound-recorded magnetic tapes; rental of image-recorded magnetic tapes; educational services relating to computer security; examination and certification for security technology of computer system; educational training relating to computers; training in the field of development of computer software; training relating to use and operation of computers; educational and instruction services relating to arts, crafts, sports or general knowledge; educational services relating to operation of computer hardware; educational services relating to operation of computer software; educational services relating to computer virus; examination, certification and grant qualification related to computer security; organization, arranging and conducting of lecture, workshops [training] or seminars relating to computer virus or computer security; arranging and conducting of lecture, workshops [training] or seminars; providing videos from the internet; educational and training services relating to cyber security and information technology; organization of competitions; organization of ceremony to award incentives; providing blog, online journal and electronic publications, not downloadable, via website; publication of articles, newsletters, warning letters, instructions, reports and summarized articles relating education;; Downloadable computer program and downloadable computer software for generating human sound and text artificially; application software for smartphones; computer hardware; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; computer software; computer utility software; computer software for firewall; computer software for data security of computers and other computer software; fittings for computer; computer software to prevent confidential information from leaking; computer software and electronic publications to provide information to users and to educate users in relation to computer and network security; computer software to monitor, report and perform the regulated compliance; computer software to backup and to restore data; computer hardware and software to protect and to enhance confidentiality of data; computer hardware and software to protect or to restore the perfect condition of data, computer, computer software, computer network; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; electronic publications recorded in electronic circuits, magnetic disks, magnetic tapes, optical disks, magnetic-optical disks; other electronic publications; electrical communication machines and instruments; electronic circuits, magnetic disks, magnetic tapes, optical disks, magnetic-optical disks and other recording media recorded with computer programs; computer programs; other electronic machines, apparatus and their parts; consumer video game programs; electronic circuits and CD-ROMs recorded with programs for hand-held games with liquid crystal displays; exposed cinematographic films; exposed slide films; slide film mounts; recorded video discs and video tapes; downloadable image files via Internet; computer software, recorded; electronic circuits, magnetic disks, magnetic tapes, optical disks, magneto-optical disk and other data carriers recorded with game information, town information, musical information, theater information, movie information, music, photos and others; computer software for playing computer games; personal digital assistants; computer peripherals; USB flash drives; portable computer hardware;; Providing on-line non-downloadable software for generating human sound and text artificially; provision of software in relation to computer, data, network security by SaaS provider; provision of computer program for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message/files/programs/data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing computer programs with a function of filtering e-mails; provision of Internet search engines; update of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use of email, instant message, website and other network communications; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of computer program and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of vaccine software for computer virus; provision and rental of other computer program; restoration of computer data destroyed or partially destroyed by computer virus and other restoration of computer data (included what is performed by dispatch); provision of information in relation of restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program’s load and problems; research and analysis of computer virus (included what is performed by dispatch); provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer program; update of pattern file for computer virus; update of other computer software; monitoring of server for extermination of computer virus and computer virus countermeasures including removal of computer virus (included what is performed by dispatch) and provision of information thereof; design, creation, maintenance of computer program; consultancy relating to design, creation, maintenance of computer program; provision of information relating to design, creation, maintenance of computer program; design, creation, maintenance of information processing system used computer; consultancy relating to design, creation, maintenance of information processing system used computer; provision of information relating to design, creation, maintenance of information processing system used computer; provision of information relating to computer bug or updating; rental of access time to computer database; information processing by computer; design of machines, apparatus, instruments (including their parts) or systems and facility composed of such machines, apparatus and instruments; technological advices and introduction about performance and operation procedures of computers, automobiles and industrial machines which need to have an advanced and technical knowledge/technology/experience to operate appropriately (technological advice relating to computers, automobiles and industrial machines); testing and research on computer programs; testing and research on machine and apparatus; rental of computer (including CPU and electronic circuits, magnetic disks, magnetic tapes recorded with computer programs and other peripheral apparatus); provision of information about computer technology via website; provision of technological information about computer; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SaaS) services; providing online non-downloadable software; Platform as a Service (PaaS); providing online non-downloadable cloud computing software; cloud computing services; consulting services in the field of cloud computing; consulting services in the field of computer security software and computer network design; troubleshooting remediation of computer software problems; technical support services relating to computer software; configuration of computer software and computer networks; remote administration and management of computer software applications;
Goods & Services
Providing on-line non-downloadable software for generating human sound and text artificially; provision of software as a service (SAAS) services for securing computers, data, and computer networks; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs, and data that were retrieved and received from computer and computer network; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; provision of Internet search engines; technical advice and consultancy relating to design of computer hardware, computer systems, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; provision of online non-downloadable computer programs for providing information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; providing advice regarding restoration and recovery of computer programs; research and analysis of computer viruses; provision of information relating to research and analysis of computer viruses; advice relating to research and analysis of computer virus; monitoring of computer servers for detection, isolation and removal of computer viruses and provision of information thereof; provision of information relating to design, creation, maintenance of computer programs; provision of information relating to computer bug detection and removal, and computer network updating; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; updating of computer software relating to computer security and prevention of computer risks; providing temporary use of on-line non-downloadable chatbot software for use in cybersecurity; troubleshooting remediation of computer software problems; technical support services, namely, troubleshooting of computer software problems;
Goods & Services
Providing online non-downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; educational and training services, namely, computer education training services relating to computer security; educational examination services provided in the field of security technologies for computer system and provision of qualification thereof; computer education training; training services in the field of computer software development; training in the use and operation of computers; educational and instruction services in the field of computer software, firmware, hardware, electronic devices, data and network security and cybersecurity; educational and instruction services namely, conducting classes, training courses and programs in the field of computer hardware; educational and instruction services relating to operation of computer software namely, conducting classes, training courses and programs in the field of computer software; educational and instruction services namely, conducting classes, training courses and programs in the field of computer viruses; educational examination services in the field of computer security and provision of authorization and qualification thereof; arranging, conducting and organization of lecture, workshop, seminars for computer education training in the field of computer viruses and computer security; arranging, conducting and organization of lectures, workshops, and seminars for computer security software, hardware and network training; providing a website featuring non-downloadable videos in the field of computer and computer software education training; educational and training services, namely, computer and computer software education training in the field of cybersecurity and information technology; organizing, arranging and conducting competitions in the fields of computer software, firmware, hardware, electronic devices, data and network security; organizing, arranging and conducting incentive award programs in the fields of computer software, firmware, hardware, electronic devices, data and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles, news, alerts, advisories, reports and bulletins in the field of computer software, firmware, hardware, electronic devices, data and network security; publishing of educational articles, news, alerts, advisories, reports and bulletins in the fields of computer software, firmware, hardware, electronic devices, data and network security;; Downloadable application software for smartphones for preventing and identifying unauthorized access, and for use in securing, monitoring and protecting data, passwords, personal identities, computers, computer networks and mobile devices; downloadable application software for smartphones for network security, web security, email security and endpoint security software; downloadable application software for smartphones, namely anti-malware, antivirus, anti-spam, anti-fraud, anti-ransomware and adblocking software, intrusion detection and prevention software, advanced threat detection and prevention software; downloadable application software for smartphones, namely software for identifying and eliminating duplicate photos, images and contact information; downloadable application software for smartphones, namely software for monitoring and updating other computer software; computer hardware; portable computer hardware; computer peripherals; pre-recorded USB flash drives containing software for securing computers, data, computer networks and computer network endpoints; computer hardware for integrated control of security functions to protect computer networks against threat by computer virus, illegal access and others; downloadable and recorded computer security software; downloadable computer utility programs for performing computer maintenance; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer utility software for scanning, detecting and identifying files or data for removal to optimize performance, increase efficiency, and secure computers, computer networks and mobile devices; downloadable computer utility software for scanning, detecting and identifying malicious, fraudulent or fake websites; downloadable computer utility software for scanning, detecting and identifying viruses, worms, spyware, malicious threats and other security risks on computers, computer networks and mobile devices; downloadable computer utility software for data conversion and decompression; downloadable and recorded computer software for the creation of firewalls; downloadable and recorded computer software for securing data in computers and other computer software; downloadable and recorded computer software to prevent confidential information from leaking; downloadable computer software providing access to information in the field of computer and network security and downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software for monitoring, reporting and performing regulatory compliance; downloadable computer software to backup and restore data; computer hardware and downloadable and recorded software to protect and to enhance confidentiality of data; computer hardware and downloadable and recorded software to protect or restore the perfect condition of data, computers, computer software, and computer networks; computer hardware and downloadable and recorded software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; recorded computer software for processing data;; Installation, maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware being repair and recovery of computers and their accessories destroyed or partially destroyed by computer virus; providing information relating to repairs being the repair and recovery of computers and their accessories destroyed or partially destroyed by computer virus; repair or maintenance of telecommunication machines and apparatus; repair or maintenance of computers; providing information relating to repairs being the repair or maintenance of computers; installation, maintenance and repair of computer network and information technology equipment; providing information relating to installation, maintenance and repair of computers, computer hardware, and computer network hardware; consulting in the field of installation, maintenance and repair of computers, computer hardware, and computer network hardware;; Retail store services featuring computer software; online retail store services featuring computer software; retail store services featuring computer hardware; online retail store services featuring computer hardware;; Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of Platform as a Service (PAAS) services for securing computers, data, and computer networks; providing on-line non-downloadable security software for use in securing computers, computer networks and computer network endpoints, and data; providing on-line non-downloadable computer antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of messages, files, programs, and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer software for filtering e-mails; provision of Internet search engines; updating of computer software for others via computer and communication networks; technical advice and consultancy relating to design of computer hardware, computer systems, computer software, computers and communication networks; installing computer programs and advice and consultancy for installing computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use in securing email, instant message, website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of information via a website relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of online non-downloadable computer programs for providing information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus in the nature of providing temporary use of non-downloadable computer anti-virus software; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer viruses; providing advice regarding restoration and recovery of computer programs; research and analysis of computer viruses; provision of information relating to research and analysis of computer viruses; advice relating to research and analysis of computer viruses; computer technology consultancy being installation of computer program; updating of computer software, namely, pattern files for detecting computer viruses; updating of other computer software; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; computer technology consultancy being information processing by computer; technological advice and consultancy regarding performance and operation of computers, and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; computer technology consultancy being testing and research on computer programs; computer services, namely computer hardware and computer endpoint testing and research; provision of information about computer technology via website; provision of technological information about computers; computer technology consultancy being consultancy and information services relating to information technology; provision of information about computer technology via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring software for processing data; providing online non-downloadable software for processing data; providing online non-downloadable software; platform as a service (PaaS) featuring computer security software; providing online non-downloadable cloud computing software for securing computers, data, and computer networks; computer technology consultancy being cloud computing services; computer technology consultancy provided in the field of cloud computing and cloud-based security software; computer technology consultancy provided in the field of computer security software, computer network design, operation and management; technical support services, namely, computer technology consultancy troubleshooting and remediation of computer software problems; technical support services, namely, computer technology consultancy; computer technology consultancy being custom configuration of computer software and computer networks; computer technology consultancy being remote administration and management of computer software applications; providing online non-downloadable software for securing computers, data, and computer networks;
Goods & Services
Computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer software for creating firewalls; downloadable computer software for protecting data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable computer software to monitor, report and perform the actions required for regulatory compliance; computer hardware and downloadable computer anti-virus software to protect and to enhance confidentiality of data; Provision of computer programs relating to computer viruses and preventive steps, namely, updating of computer software being in the nature of virtual patches to prevent threats targeted at security vulnerabilities; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps in the nature of intrusion prevention, methods for dealing with viruses; providing information relating to computer technology via a website in the field of computer bug detection and removal, and field of prevention of threats created by computer bugs
Goods & Services
Downloadable application software for smartphones, for device identification, network traffic steering, securing connections, and network and radio quality monitoring and reporting; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; computer hardware and downloadable computer anti-virus software to protect and to enhance confidentiality of data
Goods & Services
Downloadable application software for smartphones, for device identification, network traffic steering, securing connections, and network and radio quality monitoring and reporting; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer software for creating firewalls; downloadable computer software for protecting data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable computer software to monitor, report and perform the actions required for regulatory compliance; computer hardware and downloadable computer anti-virus software to protect and to enhance confidentiality of data; Provision of computer programs relating to computer viruses and preventive steps, namely, updating of computer software being in the nature of virtual patches to prevent threats targeted at security vulnerabilities; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps in the nature of intrusion prevention, methods for dealing with viruses; providing information relating to computer technology via a website in the field of computer bug detection and removal, and field of prevention of threats created by computer bugs
Goods & Services
"SERVICE"; Software as a service (SAAS) services featuring software for securing computers, securing data, and securing computer networks; provision of software as a service (SAAS) services featuring software for securing computers, securing data, and securing network security; provision of software as a service (SAAS) for managed detection, response and support for computer, data, network, and network security threats, incidents, and vulnerabilities; providing on-line non-downloadable security software for use in securing computers, securing computer networks, securing data, and securing devices connected to a network; providing on-line non-downloadable computer antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of messages, files, programs, and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer software for filtering e-mails; provision of Internet search engines; updating of computer software for others via computer and communication networks; technical advice relating to design of computer hardware, computer systems, computer software, computers and communication networks; installing computer programs and advice and consultancy for installing computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use in securing email, securing instant messages, and securing website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; providing information relating to computer technology via a website in the field of computer viruses and their varieties, in the field of special characteristics of computer viruses, in the field of tendencies of computer viruses, in the field of examples of invasion and infections of computer viruses, in the field of computer virus removal methods, in the field of computer virus preventative steps, and in the field of methods for dealing with computer viruses; providing online non-downloadable computer programs for retrieving and displaying data relating to computer viruses and their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus in the nature of providing temporary use of non-downloadable computer anti-virus software; recovery of computer data destroyed or partially destroyed by computer viruses; provision of information via a website relating to restoration of computer data destroyed or partially destroyed by computer viruses; providing advice in the field of recovery of computer programs; research and analysis in the field of computer viruses; providing information relating to research and analysis of computer viruses via a website; providing advice in the field of research and analysis of computer viruses; updating of computer software, namely, pattern files for detecting computer viruses; updating of computer software; monitoring of computer servers for detection, isolation and removal of computer viruses and providing information relating thereto; design, development, and maintenance of computer software; computer technology consultancy provided in the field of design, creation, maintenance of computer program; providing information in the field of computer software design, computer software development, and maintenance of computer software programs; computer technology consultancy being design, creation, and maintenance of information processing systems for use with computers; computer technology consultancy provided in the field of design, creation, and maintenance of information processing systems for use with computers; providing information in the field of computer software design, creation, and maintenance of information processing systems for use with computers; providing information in the field of computer technology consultancy relating to computer bug detection and removal, and computer network updating; computer technology consultancy being information processing by computer; computer technology consultancy being testing and research on computer programs; computer services, namely, testing of computer hardware; computer services, namely, technological research in the field of computer hardware; providing information in the field of computer technology via website; providing information relating to computer technology via a website; computer technology consultancy being consultancy and information services; providing information in the field of computer technology about computer software via website; providing information in the field of computer technology about computer software; computer security consultancy; updating of computer software in the fields of computer security and prevention of computer risks; cybersecurity services in the nature of restricting unauthorized access to computer systems for securing computers, data, and computer networks; technology consultation in the field of cybersecurity services for securing computer, data and computer networks; computer security services in the nature of computer security consultancy for securing computers, data, and computer networks; computer security services in the nature of computer network security consultancy for securing computers, data, and computer networks; computer security services in the nature of internet security consultancy for securing computers, data, and computer networks; computer security services in the nature of data security consultancy for securing computers, data, and computer networks; computer security services in the nature of testing of security systems for securing computers, data, and computer networks; technology consultation in the field of cybersecurity being detection and response services for cybersecurity incidents; computer technology consulting services in the field of cybersecurity Incident Response services; computer technology consulting services in the field of cybersecurity Incident Response services being identifying, responding to, managing and mitigating cybersecurity incidents, threats or attacks; consulting services in the field of cloud-based security software; computer technology consultancy in the fields of computer security software and computer network design, operation and management; technical support services, namely, troubleshooting of computer software problems; technical support services, namely, remediation of computer software problems in the field of cybersecurity incidents, threats or attacks; technical support services, namely, troubleshooting of computer software problems; computer technology consultancy in the fields of custom configuration of computer software and computer networks; computer technology consultancy in the fields of remote administration and management of computer software applications and networks; computer services, computer software services and computer network services, namely, computer technology consultancy in the fields of monitoring, identifying, detecting, investigating, analyzing and reporting threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network hardware that connects to and exchanges information with a computer network; computer services, computer software services and computer network services, namely, computer technology consultancy in the fields of preventing, containing, isolating, responding to, remediating and repairing damage from threats, breaches and problems in computer software and computer networks;
Goods & Services
Downloadable computer software for securing communication software; downloadable computer software for securing software running on communication servers or platforms; downloadable computer software for protecting communication software from vulnerability attacks, malware infection, and service disruption; downloadable computer software for protecting software running on communication servers or platforms from vulnerability attacks, malware infection, and service disruption; downloadable computer software for data security of computers and other computer software in the field of communication platforms, servers, software, and services; Software as a service (SAAS) services in relation to computer, data, and network security featuring software for securing communication software; software as a service (SAAS) services in relation to computer, data, and network security featuring software for securing software running on communication servers or platforms; software as a service (SAAS) services in relation to computer, data, and network security featuring software for protecting communication software from vulnerability attacks, malware infection, and service disruption; software as a service (SAAS) services in relation to computer, data, and network security featuring software for protecting software running on communication servers or platforms from vulnerability attacks, malware infection, and service disruption; provision of on-line non-downloadable computer programs for platform construction for provision of SaaS application in the nature of O-RAN platforms as a service, namely, computer software platforms for securely executing software running on communication servers or platforms; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for securing communication software; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for securing software running on communication servers or platforms; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for protecting communication software from vulnerability attacks, malware infection, and service disruption; providing on-line non-downloadable software for use in computer security, data security, and network security, namely, software for protecting software running on communication servers or platforms from vulnerability attacks, malware infection, and service disruption
Goods & Services
Downloadable application software for smartphones, for network security software, web security software, email security software and endpoint security software; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in the field of computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; recorded computer antivirus software to protect and to enhance confidentiality of data; computer hardware and downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable cybersecurity software for computer network security; downloadable computer security software for computer network security; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software;downloadable computer security software for protection of mobile networks, computers, computer networks, computer data, and mobile network endpoints; Provision of Internet search engines; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; computer programming for others; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information about restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program's load and problems; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; updating of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security and computer network security; technological advice and consultancy regarding performance and operation of computers and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks
Goods & Services
Downloadable application software for smartphones, for network security software, web security software, email security software and endpoint security software; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in the field of computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; computer hardware to protect and to enhance confidentiality of data; recorded computer antivirus software to protect and to enhance confidentiality of data; computer hardware and downloadable computer anti-virus software to protect or to restore the perfect condition of data, computer, computer software, computer network; computer hardware and downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable cybersecurity software for computer network security; downloadable computer security software for computer network security; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of mobile networks, computers, computer networks, computer data, and mobile network endpoints; Provision of Internet search engines; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; installation of computer programs and advices and consultancy for installation of computer programs; computer programming for others; provision of information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information about restoration of computer data destroyed or partially destroyed by computer virus; advices for restoration of computer program's load and problems; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advices relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; updating of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security and computer network security; technological advice and consultancy regarding performance and operation of computers and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks

Goods & Services
Downloadable application software for smartphones, for receiving software updates, accessing custom reports, receiving threat alerts, accessing research and insights from security experts, technical support and troubleshooting services and providing user authentication services in the field of computer and network security, web security, email security and endpoint security; downloadable application software for smartphones, for accessing, viewing and managing network security software, web security software, email security software and endpoint security software; downloadable computer software for receiving software updates, accessing custom reports, receiving threat alerts, accessing research and insights from security experts, technical support and troubleshooting services and providing user authentication services in the field of computer and network security, web security, email security and endpoint security; downloadable computer security software; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable computer software for downloading and reading electronic publications on portable electronic devices to provide information to users and to educate users in relation to computer and network security; downloadable computer security software to protect data, computers, computer software, and computer networks | Provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; provision of Internet search engines; technical advice and consultancy relating to design of computers, computer system, computer software, computers and communication networks; advice and consultancy for installation of computer programs; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; provision of online, non-downloadable information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; provision of technology information relating to computer bug or updating; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software; updating of computer software relating to computer security and prevention of computer risks



Goods & Services
"SERVICE"; Computer services, computer software services and computer network services for others, namely, monitoring, identifying, and detecting threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network endpoints; computer services, computer software services and computer network services for others, namely, investigating, analyzing and reporting threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network endpoints; computer services, computer software services and computer network services for others, namely, containing, isolating, responding to, remediating and repairing damage from threats, breaches and problems in computer software and computer network software; computer services, computer software services and computer network services for others, namely, preventing threats, breaches and problems in computer software and computer networks; computer services, computer software services and computer network services for others, namely, remote management of information technology (IT) systems of others; technical support services, namely, detection, analysis, reporting and remediation of computer software and software as a service (SAAS), technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, computer network security incident detection response and remediation services; technical support services, namely, administration, monitoring and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, reviewing existing computer network environment, and consulting on computer network security and assisting with installation, monitoring and maintaining, computer software, and monitoring of computer networks, and network components; technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer technology support services, namely, help desk services; technical support services, namely, remote infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; technical support services, namely, Managed XDR (Extended Detection and Response) services being, monitoring, identifying, detecting and managing threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network endpoints in the field of computer security software, computer network security and computer network endpoint security; technical support, namely, installation, administration, diagnosing problems with and monitoring of technological functions of computer software in the fields of computer software and network security; information technology consulting services regarding professional and managed security services for securing and protecting computers, computer networks, endpoints and data; computer security consultancy; computer software consulting services; computer network software consulting services; computer hardware consulting services, namely, consulting services in the fields of selection, implementation and use of computer hardware; computer hardware consulting services, namely, consulting services in the field of cybersecurity; information technology consulting services; consulting services in the field of cloud computing, cloud computing networks and applications; technology consulting services in the fields of computers, computer hardware selection, computer networks and network security and computer software as a service (SAAS); consultation in deploying and managing computer security hardware, software, networks and network components; custom configuration of computer software, computer hardware, computer systems and computer networks; developing and deploying customized computer software in the fields of computer software, data and network security; computer programming and computer system analysis; updating of computer software for others relating to computer security and prevention of computer and network risks; providing notification and delivery of software updates through online updates, enhancements and patches

Goods & Services
downloadable computer security software; downloadable computer antivirus software; downloadable anti-spyware, anti-spam, and anti-fraud computer software; downloadable anti-malware and anti-ransomware software; downloadable firewall software; downloadable malicious code and malicious content screening software; downloadable data loss prevention (DLP) software; downloadable data encryption software; downloadable computer utility software; downloadable computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; downloadable computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; downloadable computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; downloadable computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers | software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus software; providing on-line non-downloadable computer antivirus software; software as a service (SAAS) services featuring anti-spyware, anti-spam, and anti-fraud computer software; providing on-line non-downloadable anti-spyware, anti-spam, and anti-fraud software; software as a service (SAAS) services featuring anti-malware and anti-ransomware software; providing on-line non-downloadable anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing on-line non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing on-line non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring data loss prevention (DLP) software; providing on-line non-downloadable data loss prevention (DLP) software; software as a service (SAAS) services featuring data encryption software; providing on-line non-downloadable data encryption software; software as a service (SAAS) services featuring computer utility software; providing on-line non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; providing on-line non-downloadable software for detecting and reporting malware, trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; providing on-line non-downloadable software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; providing on-line non-downloadable software for detecting, analyzing, reporting and sharing computer, data and network security threats; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; providing on-line non-downloadable software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers

Goods & Services
"NETWORK"

Goods & Services
Class 009: downloadable computer security software; downloadable anti-malware software; downloadable intrusion detection and prevention software; downloadable advanced threat protection software; downloadable computer software and computer hardware for use in securing, monitoring and protecting data, computers, and mobile devices; downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; downloadable computer software and computer hardware for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; downloadable computer software for use in scanning for, identifying, reporting and removing malware and viruses; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; downloadable IOT security software; downloadable security software for Industrial Control Systems (ICS); downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; Class 042: software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring anti-malware software; providing on-line non-downloadable anti-malware software; software as a service (SAAS) services featuring intrusion detection and prevention software; providing on-line non-downloadable intrusion detection and prevention software; software as a service (SAAS) services featuring advanced threat protection software; providing on-line non-downloadable advanced threat protection software; software as a service (SAAS) services featuring computer software for use in securing, monitoring and protecting data, computers, and mobile devices; providing on-line non-downloadable computer software for use in securing, monitoring and protecting data, computers, and mobile devices; software as a service (SAAS) services featuring computer software for detecting and responding to advanced persistent threats and targeted security attacks; providing on-line non-downloadable computer software for detecting and responding to advanced persistent threats and targeted security attacks; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; providing on-line non-downloadable computer software for scanning for, identifying, patching and repairing security breaches in data, computers and mobile devices; software as a service (SAAS) services featuring computer software for use in scanning for, identifying, reporting and removing malware and viruses; providing on-line non-downloadable containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing on-line non-downloadable computer software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing on-line non-downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing on-line non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing on-line non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing on-line non-downloadable computer software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing on-line non-downloadable computer software for providing virus and malware pattern updates


Goods & Services
Computer hardware; computer hardware for integrated control of security functions to protect computer networks against threat by computer virus, illegal access and others; downloadable and recorded computer security software; downloadable computer network security software, web security software, email security software and endpoint security software, all for preventing unauthorized access, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable anti-malware, antivirus, anti-spam, anti-fraud, and anti-ransomware software; downloadable intrusion detection and prevention software; downloadable advanced threat detection and prevention software; downloadable industrial network security software; downloadable threat detection and response (XDR) software; downloadable computer software for updating other computer software; downloadable computer utility software for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; downloadable computer software for the creation of firewalls; downloadable computer software for securing data in computers and other computer software; downloadable computer software for securing confidential information and preventing confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software for monitoring, reporting and performing regulatory compliance; downloadable computer software to backup and to restore data; computer hardware and downloadable computer software to protect and to enhance confidentiality of data; computer hardware and downloadable computer software to protect or to restore data, computers, computer software, and computer networks; computer hardware and downloadable computer software to protect or to restore data and computer networks; downloadable electronic publications in the nature of brochures, data sheets, and whitepapers in the field of computer software security, data and network security and network endpoint security | Software as a service (SAAS) services featuring computer security software; Software as a service (SAAS) services featuring software for providing computer network security, container security, file storage security, cloud workload security, API security, and application security, all for preventing unauthorized access, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; Software as a service (SAAS) services featuring cloud security posture management (CSPM) software; Software as a service (SAAS) services featuring cloud security services platforms for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; Software as a service (SAAS) services featuring computer network security software, web security software, email security software and endpoint security software, all for data threat detection, and for use in securing, monitoring and protecting data, computers, computer networks and mobile devices; Software as a service (SAAS) services featuring anti-malware, antivirus, anti-spam, anti-fraud, and anti-ransomware software; Software as a service (SAAS) services featuring intrusion detection and prevention software; Software as a service (SAAS) services featuring advanced threat protection software; Software as a service (SAAS) services featuring industrial network security software; Software as a service (SAAS) services featuring threat detection and response (XDR) software; Software as a service (SAAS) services featuring computer software for updating other computer software; technical support services, namely, troubleshooting of computer software problems; computer security consultancy; provision of software as a service (SAAS) services for securing computers, data, and computer networks; providing online non-downloadable security software for use in computer security, data security, network security; providing online non-downloadable antivirus software; providing online non-downloadable software for monitoring, filtering and reporting of messages, files, programs, and data that were retrieved and received from computers and computer networks; providing temporary use of online non-downloadable security software for monitoring and protecting data, computers and electronic devices; providing online non-downloadable software for searching and reporting vulnerability of security of websites; providing online non-downloadable computer programs with a function of filtering e-mails; updating of computer software via computer and communication networks; technical advice and consultancy relating to design of computer hardware, computer systems, computer software, computers and communication networks; installation of computer programs and advice and consultancy for installation of computer programs; providing online non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer viruses; providing online non-downloadable software for computer security; providing online non-downloadable software for use in securing email, instant message, website and other network communications; providing online non-downloadable software for limitation of access to protect data; providing online non-downloadable software for backup and restoration of data; providing online non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of information via a website relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of online non-downloadable antivirus software; restoration and recovery of computer data destroyed or partially destroyed by computer viruses; provision of information in relation to restoration of computer data destroyed or partially destroyed by computer viruses; providing advice regarding restoration and recovery of computer programs; research and analysis of computer viruses; provision of information relating to research and analysis of computer viruses; advice relating to research and analysis of computer viruses; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; updating of other computer software; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, and maintenance of computer programs; consultancy relating to design, creation, and maintenance of computer programs; provision of information relating to design, creation, and maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security and computer network security; technological advice and consultancy regarding performance and operation of computers, computer systems in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; computer services, namely, computer program testing and research; computer services, namely, computer hardware testing and research

Goods & Services
Class 042: Software as a service (SAAS) services featuring computer security software; online non-downloadable computer security software; providing temporary use of non-downloadable cloud-based security software; Software as a service (SAAS) services featuring software for providing computer network security, container security, file storage security, cloud workload security, API security, and application security; online non-downloadable software for use in providing computer network security, container security, file storage security, cloud workload security, API security, and application security; providing temporary use of non-downloadable cloud-based software for providing computer network security, container security, file storage security, cloud workload security, API security, and application security; Software as a service (SAAS) services featuring cloud security posture management (CSPM) software; online non-downloadable cloud security posture management (CSPM) software; providing temporary use of non-downloadable cloud-based software for cloud security posture management (CSPM); Platform as a service (PAAS) featuring computer security software; online non-downloadable computer security software platform; providing temporary use of non-downloadable cloud-based computer security software platform; cloud security services platform; consulting services in the field of security software as a service (SAAS); consulting services in the field of cloud computing and cloud-based security software; consulting services in the field of computer security software, computer network design, operation and management; technical support services, namely, troubleshooting of computer security software problems; computer services, namely, cloud hosting provider services

Goods & Services
Class 042: software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus, anti-spyware, anti-spam, anti-fraud, anti-malware and anti-ransomware software; providing online non-downloadable computer antivirus, anti-spyware, anti-spam, anti-fraud, anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing online non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing online non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring computer software for detecting, blocking and reporting malware, Trojans, worms, spyware, and ransomware; providing online non-downloadable software for detecting, blocking and reporting malware, Trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; software as a service (SAAS) services featuring computer software for detecting and blocking exploit activities against vulnerable software; providing online non-downloadable software for detecting and blocking exploit activities against vulnerable software; software as a service (SAAS) services featuring computer software for inspecting and blocking unwanted computer network traffic; providing online non-downloadable software for inspecting and blocking unwanted computer network traffic; software as a service (SAAS) services featuring computer software for application whitelisting, monitoring of sensitive data files, directories and processes, and inspection of computer system logs; providing online non-downloadable software for application whitelisting, monitoring of sensitive data files, directories and processes, and inspection of computer system logs; software as a service (SAAS) services featuring computer software for use in computer and network security policy management and enforcement; providing online non-downloadable software for use in computer and network security policy management and enforcement; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, hosting web consoles; software as a service (SAAS) services featuring computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; providing online non-downloadable software for use in coordinating, managing and tracking responses to computer network and data security breaches; software as a service (SAAS) services featuring computer software for use in coordinating, managing, monitoring, tracking and reporting computer and network security issues; providing online non-downloadable software for use in coordinating, managing, monitoring, tracking and reporting computer and network security issues; software as a service (SAAS) services featuring computer software for monitoring of and reporting on computer security software and hardware; providing online non-downloadable software for monitoring of and reporting on computer security software and hardware; software as a service (SAAS) services featuring computer software for monitoring the operation, activity, and status of other computer software and software agents; providing online non-downloadable software for monitoring the operation, activity, and status of other computer software and software agents; software as a service (SAAS) services featuring computer software for managing and updating other computer security software, software agents and hardware; providing online non- downloadable software for managing and updating other computer security software, software agents and hardware; software as a service (SAAS) services featuring computer software for notification and delivery of software updates; providing online non-downloadable software featuring computer software for notification and delivery of software updates; consulting services in the fields of computer software and software as a service; consulting services in the fields of computer, data, server and computer network security; consultation in the field of deploying and managing computer security software; consulting services in the fields of server, computer, data and network security; custom configuration of computer software and computer networks; computer programming services; developing and deploying customized software in the field of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software prob

Goods & Services
Financial sponsorship of individuals' participation in conferences; providing scholarships for individuals to participate in conferences; charitable foundation services, namely, providing fund raising activities, scholarships and financial assistance for individuals to participate in cybersecurity and information technology conferences

Goods & Services
"SECURITY APP PROTECT"


Goods & Services
Computer security software; computer network security policy management software; web consoles; data encryption software; computer software for managing and updating other computer security software and hardware; computer software for use in computer and network security policy management and enforcement; computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; computer software for monitoring of and reporting on computer security software and hardware; computer software for securing, monitoring and protecting data, computers, computer and communication networks, network endpoints, and mobile devices; Software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer software for use in computer network security policy management; providing on-line non-downloadable computer software for use in computer network security policy management; software as a service (SAAS) services featuring web consoles; providing on-line non-downloadable computer software, namely, hosting web consoles; software as a service (SAAS) services featuring computer software for managing and updating other computer security software and hardware; providing on-line non-downloadable computer software for managing and updating other computer security software and hardware; software as a service (SAAS) services featuring computer software for use in computer and network security policy management and enforcement; providing on-line non-downloadable computer software for use in computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; providing on-line non-downloadable computer software for use in coordinating, managing and tracking responses to computer network and data security breaches; software as a service (SAAS) services featuring computer software for monitoring of and reporting on computer security software and hardware; providing on-line non-downloadable computer software for monitoring of and reporting on computer security software and hardware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing on-line non-downloadable computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints

Goods & Services
computer security software; computer antivirus software; anti-spyware, anti-spam, and anti-fraud computer software; anti-malware and anti-ransomware software; firewall software; malicious code and malicious content screening software; data loss prevention (DLP) software; data encryption software; computer utility software; computer software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers | software as a service (SAAS) services featuring computer security software; providing on-line non-downloadable computer security software; software as a service (SAAS) services featuring computer antivirus software; providing on-line non-downloadable computer antivirus software; software as a service (SAAS) services featuring anti-spyware, anti-spam, and anti-fraud computer software; providing on-line non-downloadable anti-spyware, anti-spam, and anti-fraud software; software as a service (SAAS) services featuring anti-malware and anti-ransomware software; providing on-line non-downloadable anti-malware and anti-ransomware software; software as a service (SAAS) services featuring firewall software; providing on-line non-downloadable firewall software; software as a service (SAAS) services featuring malicious code and malicious content screening software; providing on-line non-downloadable malicious code and malicious content screening software; software as a service (SAAS) services featuring data loss prevention (DLP) software; providing on-line non-downloadable data loss prevention (DLP) software; software as a service (SAAS) services featuring data encryption software; providing on-line non-downloadable data encryption software; software as a service (SAAS) services featuring computer utility software; providing on-line non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; providing on-line non-downloadable software for detecting and reporting malware, Trojans, worms, spyware, and ransomware; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing on-line non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; providing on-line non-downloadable software for detecting, analyzing, reporting and sharing computer, data and network security threats; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; providing on-line non-downloadable software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers

Goods & Services
computer security software; computer anti-virus software; anti-spyware and anti-fraud software; malicious code and content screening and scanning software; computer software for use in detecting and removing adware, malware, spyware, malicious content and unauthorized software; computer software for securing and protecting data, computers, tablet computers, and mobile devices

Goods & Services
anti-virus software; computer software for scanning for, detecting, reporting on and eliminating viruses, worms, trojans, adware, spyware, malware, security exploits, bots, and malicious software on computers, laptops and tablet computers and computer networks; computer software for reviewing, comparing, recovering and restoring data files

Goods & Services
Class 042: Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities

Goods & Services
Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities

Goods & Services
Software as a service (SAAS) services featuring software for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a service (SAAS) services featuring computer security software for data extraction and analysis used to identify and report malicious files; software as a service (SAAS) services featuring computer software for the protection, monitoring, authenticating, and securing of data, computers, computer networks, endpoints; software as a service (SAAS) services featuring computer security software for use in scanning for, preventing, identifying, assessing and reporting on threats to, and security vulnerabilities in, computers, computer networks, endpoints; software as a service (SAAS) services featuring computer software for preventing unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing online databases and websites featuring information in the fields of computer security software and services, computer network and endpoint security, data security and security for computers, computer servers, computer users; providing videos, whitepapers, articles, briefs and electronic information in the fields of computer security software and services, computer network and endpoint security, data security and security for computers, computer servers, computer users

Goods & Services
Computer security software; computer antivirus software, anti-malware software and anti-ransomware software; computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; computer security software for data extraction and analysis used to identify and report malicious files; computer hardware and computer software for the protection, monitoring, authenticating, and securing of data, computers, computer networks, endpoints and mobile devices; computer security software and hardware, namely, intrusion prevention systems; computer security software for use in scanning for, preventing, identifying, assessing and reporting on threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; computer software for preventing unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets

Goods & Services
Computer hardware; computer security software; computer utility software; computer software for data security of computer hardware, computer networks and other computer software; computer software for preventing unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; computer hardware and computer software for the protection and securing of data; computer hardware and computer software for protecting electronic data, computer hardware, computer software, and computer networks; computer security appliances, namely, computer hardware; electronic software updates, namely, downloadable computer software and associated downloadable electronic data files for updating computer software in the fields of computer and data security




Goods & Services
computer security software; computer anti-virus software; anti-spyware and anti-fraud software; malicious code and content screening software; computer software for use in detecting, blocking and removing malware, spyware, malicious content and unauthorized software; computer software for securing and protecting data, computers, tablet computers, and mobile devices; computer software for identifying and blocking unwanted communications and messages; computer software for identifying and blocking websites containing malicious, untrustworthy and unwanted content and programs; computer software for use in tracking, detecting and reporting locations of tablet computers and mobile devices; computer software to lock a mobile device or erase the memory of a mobile device upon receipt of a remote command; data privacy control software; computer software for detecting, monitoring and controlling data privacy settings for other software and services

Goods & Services
computer security software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer network and data security software for use in protecting computers, computer networks, and mobile devices; computer software for use in monitoring, inspecting, analyzing and reporting on data traffic on computer networks; computer software for identifying, tracking, simulating and analyzing potential security threats to computers, computer data and computer systems; computer software for identifying malicious content, communications and computer and network behavior threatening computers and computer networks; computer software for detecting and responding to advanced persistent threats and targeted security attacks; computer hardware; computer security appliances, network security appliances, and unified threat management (UTM) appliances, namely, computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices; virtual computer security appliances and virtual network security appliances, namely, virtual machine images emulating computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices

Goods & Services
"LONGEVITY"

Goods & Services
"NAS SECURITY"

Goods & Services
Class 009: computer, data, and network security software; computer antivirus and content security software; computer utility software; malicious code and content screening software; anti-spam, anti-fraud, and anti-phishing computer software; computer software for monitoring, filtering, and reporting messages, files, programs and data retrieved or received from computer and communication networks; computer software for use in scanning, detecting, quarantining, eliminating, blocking and reporting on viruses, worms, trojans, spyware, adware, malware, security exploits, bots and unauthorized data and programs on computers, electronic devices, and handheld and mobile computing and communication devices; computer software for use in detecting viruses, worms, trojans, spyware, adware, malware, security exploits, bots and unauthorized data and programs on computers and electronic devices; web browser security add-on software, namely, computer software for protecting web browser users from malicious, untrustworthy and unwanted content and programs; computer software for ensuring the security of wireless communications; computer software for the authentication of wireless internet access points; computer software for remotely securing data and files in the event of theft; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer and network security; computer software to protect the confidentiality of data and passwords; computer software for protecting the integrity of data, computers, computer software, and mobile computing and communication devices from viruses, worms, trojans, spyware, adware, malware and unauthorized access



Goods & Services
Class 009: computer software for use in masking data entry and keystrokes; computer software for use in identity and password protection; computer anti-virus software; malicious code and malicious content screening software; computer security software; computer software for use in scanning, detecting, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer utility software; computer software for use in repairing damage from viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Class 042: computer services, namely, online scanning, detecting, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services; providing online computer databases in the fields of computer software, computer and data security and computer system management; providing information relating to computer software, computer and data security and computer system management via the Internet and other computer and communications networks; provision of information relating to viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices via the Internet and other computer and communications networks; technical consultation in the field of computers, computer systems, computer software, and computer and communication networks; technical support services, namely, troubleshooting of computer hardware and software problems via telephone and electronic mail; services in the nature of detecting and removing computer viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs and threats; Class 045: scanning and monitoring of computer systems and data for security purposes; providing information in the fields of computer viruses, computer hardware and software applications in security; providing enterprise security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computers, computer data, computer software products and computer networks; computer network security services, namely, intrusion detection services

Goods & Services
Computer software for protecting computers, computer servers, computer applications, computer data, and databases | Training in the field of computer security | Monitoring of computer systems for protection purposes; consulting in the field of computer systems security


Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computers, computer software, and computer network; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); Updating of computer security software via computer and communication networks; computer programming for others in the field
of cybersecurity; updating of computer software, namely, pattern files for detecting computer viruses; update of computer security
software for others; design, creation, and maintenance of information processing systems for use with computers in the field of
cybersecurity; provision of information relating to design, creation, and maintenance of information processing systems for use
with computers in the field of cybersecurity; provision of information relating to computer bug detection and removal, and
computer network updating; information processing by computers in the field of data security, computer network security and
vehicle and automobile security; provision of information about computer security technology via website; provision of
technological information about computers in the field of cybersecurity; provision of technological information about computer
security software via website; provision of technological information about computer security software; updating of computer
software relating to computer security and prevention of computer risks; platform as a service (PaaS) featuring computer security
software

Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, in-vehicle computer
network security, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to
automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers,
in-vehicle computer network security, computer data, and vehicle security operations centers (VSOCs); downloadable computer
software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for
protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software;
downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer data,
and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance;
downloadable computer software for data security of computers and other computer software; downloadable computer security
software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets,
whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to
educate users in relation to computer security; downloadable computer software to monitor, report and perform the regulated
compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to
protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect
condition of data, computers, computer software, and in-vehicle computer networks for securing vehicles; downloadable computer
anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic
publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides
to provide information to users and to educate users in relation to computers, computer security, data security, and vehicle
security; downloadable cybersecurity software for protection of vehicles, computers, in-vehicle computer network security,
computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting
and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information
and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection
software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response
(XDR) software; downloadable computer security software for protection of vehicles, computers, in-vehicle computer network
security, computer data, and vehicle security operations centers (VSOCs); none of the aforementioned goods being in relation to
computer networking switches, data center switches, unified fabric switches, and computer networking software | Provision of software as a service (SAAS) services for securing computers, data, and in-vehicle computer network security;
provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS
application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for
use in computer security, data security, in-vehicle network security; providing on-line non-downloadable antivirus software;
providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were
retrieved and received from computers and in-vehicle computer network security; providing temporary use of non-downloadable
software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and
reporting vulnerability of security of website; updating of computer software via computer and communication networks; providing
on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially
destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line nondownloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and
restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer
programming for others; provision of online, non downloadable anti-virus computer programs and information relating to computer
viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods,
preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research
and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to
research and analysis of computer virus; updating of computer software, namely, pattern files for detecting computer viruses;
update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and
provision of information thereto; design, creation, maintenance of computer programs; provision of information relating to design,
creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with
computers; provision of information relating to design, creation, and maintenance of information processing systems for use with
computers; provision of information relating to computer bug detection and removal, and in-vehicle computer network updating for
securing vehicles; information processing by computers in the field of data security, and vehicle and automobile security; testing
and research on computer programs; product testing and product research on machine and apparatus; provision of information
about computer technology via website; provision of technological information about computers; information services relating to
information technology; provision of technological information about computer software via website; provision of technological
information about computer software; computer security consultancy; updating of computer software relating to computer security
and prevention of computer risks; software as a service (SAAS)services featuring computer security software; platform as a
service (PaaS) featuring computer security software; none of the aforementioned services being in relation to computer
networking switches, data center switches, unified fabric switches, and computer networking software

Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computer, computer software, computer network; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; updating of computer software, namely, pattern files for detecting computer viruses ; update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, maintenance of computer programs; consultancy relating to design, creation, maintenance of computer programs; provision of information relating to design, creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; technological advice and consultancy regarding performance and operation of computers, computer systems and software in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; platform as a service (PaaS) featuring computer security software

Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computer, computer software, computer network; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus ; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; updating of computer software, namely, pattern files for detecting computer viruses; update of computer software for others; design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; testing and research on computer programs; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring computer security software; platform as a service (PaaS) featuring computer security software

Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computers, computer software, and computer networks; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable firewall software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, maintenance of computer programs; consultancy relating to design, creation, maintenance of computer programs; provision of information relating to design, creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; technological advice and consultancy regarding performance and operation of computers, computer systems and software in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring computer security software; platform as a service (PaaS) featuring computer security software

Goods & Services
Downloadable cybersecurity application software for smartphones for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs), and analyzing, detecting and responding to automotive threats; downloadable cybersecurity software; downloadable computer software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable computer software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit security software; downloadable computer utility software, namely, computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable computer utility programs for performing computer maintenance; downloadable computer software for creating firewalls; downloadable computer software for data security of computers and other computer software; downloadable computer security software to prevent confidential information from leaking; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable computer software to monitor, report and perform the regulated compliance; downloadable computer software to backup and to restore data; downloadable computer anti-virus software to protect and to enhance confidentiality of data; downloadable computer anti-virus software to protect or to restore the perfect condition of data, computers, computer software, and computer networks; downloadable computer anti-virus software to protect or to restore the effectiveness of data and the infrastructure of computers; downloadable electronic publications in the nature of data sheets, whitepapers, manuals, administrator guides, quick start guides, and best practice guides to provide information to users and to educate users in relation to computer and network security; downloadable cybersecurity software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs); downloadable cybersecurity software for analyzing, detecting and responding to threats to automobiles and vehicles; downloadable cybersecurity software for protection of personal information and data and prevention of data leaks; downloadable computer cockpit cybersecurity software; downloadable intrusion detection software; downloadable firewall software; downloadable anti-malware software; downloadable antivirus software; downloadable threat detection and response (XDR) software; downloadable computer security software for protection of vehicles, computers, computer networks, computer data, and vehicle security operations centers (VSOCs) | Provision of software as a service (SAAS) services for securing computers, data, and computer networks; provision of temporary use of on-line non-downloadable computer programs for platform construction for provision of SaaS application; design and maintenance of website for providing SaaS application; providing on-line non-downloadable software for use in computer security, data security, network security; providing on-line non-downloadable antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of message, files, programs and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for data security of computer and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; updating of computer software via computer and communication networks; technical advices and consultancy relating to design of computers, computer system, computer software, computers and communication networks; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for limitation of access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; provision of online, non-downloadable anti-virus computer programs and information relating to computer viruses, including their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, methods for dealing with viruses; provision of online non-downloadable computer antivirus software; research and analysis of computer viruses; provision of information relating to research and analysis of computer virus; advice relating to research and analysis of computer virus; installation of computer programs; updating of computer software, namely, pattern files for detecting computer viruses; update of computer software for others; monitoring of servers for detection, isolation and removal of computer viruses and provision of information thereto; design, creation, maintenance of computer programs; consultancy relating to design, creation, maintenance of computer programs; provision of information relating to design, creation, maintenance of computer programs; design, creation, and maintenance of information processing systems for use with computers; consultancy relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to design, creation, and maintenance of information processing systems for use with computers; provision of information relating to computer bug detection and removal, and computer network updating; information processing by computers in the field of data security, computer network security and vehicle and automobile security; technological advice and consultancy regarding performance and operation of computers, computer systems and software in automobiles and computer systems in industrial machines for which an advanced and technical knowledge and experience is required to operate; testing and research on computer programs; product testing and product research on machine and apparatus; provision of information about computer technology via website; provision of technological information about computers; consultancy and information services relating to information technology; provision of technological information about computer software via website; provision of technological information about computer software; computer security consultancy; updating of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) services featuring computer security software; platform as a service (PaaS) featuring computer security software

Goods & Services
Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things ("IOT") security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints

Goods & Services
Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things ("IOT") security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates

Goods & Services
Downloadable computer security software; downloadable computer software for monitoring and managing security software and Industrial Control Systems (ICS) software; downloadable computer software for managing security software and Industrial Control Systems (ICS) software policies; downloadable security software for Industrial Control Systems (ICS); downloadable Internet of Things ("IOT") security software; downloadable computer software for endpoint defense; downloadable computer software for securing industrial machinery, Industrial Control Systems (ICS) and manufacturing; downloadable computer software for network and device security; downloadable computer software for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software for detecting and reporting abnormal Industrial Control Systems (ICS) operations; downloadable computer software for patching and vulnerability management of Industrial Control Systems (ICS) software; downloadable anti-virus software; downloadable anti-malware software; downloadable computer software for Industrial Control Systems (ICS) application inventory monitoring and management; downloadable computer software for scanning for, detecting, identifying, and blocking malware, security threats and security breaches; downloadable computer software for patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for whitelisting, approving and trusting other software, hardware and peripherals; downloadable computer software for blocking and blacklisting other software, hardware and peripherals; downloadable computer software for scanning, monitoring, verifying and permitting or blocking other computer software, hardware and peripherals; downloadable computer software for monitoring, segmenting and locking down data, computers, computer hardware, and network endpoints

Goods & Services
computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints

Goods & Services
Software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; providing online non-downloadable software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring virtual server software; providing online non-downloadable virtual server software; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; computer software consulting services; computer network consulting services; computer hardware consulting services; information technology consulting services; consulting services in the field of cloud computing; consulting in the field of cloud computing networks and applications; consulting services in the fields of computer software and software as a service; consulting services in the fields of computers, computer hardware, computer networks and network security; consulting services in the fields of industrial control systems and manufacturing computer hardware and software security, IOT security hardware and software; consultation in deploying and managing computer security hardware, software and network components; computer network and software consultation services for securing industrial machinery; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software; technical support services, namely, administration, management and updating of computers, computer hardware, computer software and computer networks; technical support services, namely, conducting onsite visits and review existing network environment, and consulting on computer network security and assisting with installation of computer hardware and software and network components; providing virtual computer systems and virtual computer environments through cloud computing; providing virtual security appliances, namely, virtual hardware and software for securing and protecting computers, computer hardware, industrial machinery and computer networks

Goods & Services
Computer hardware; computer networking hardware; computer hardware, namely, firewalls; downloadable computer security software; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; IOT security software; downloadable security software for Industrial Control Systems (ICS); web consoles; downloadable computer software for network and device security; downloadable virtual server software; downloadable computer utility software; downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for computer network management and configuration; downloadable computer software for managing computer hardware, switches and routers; USB flash drives; portable computer security hardware; portable computer hardware, peripherals and USB drives containing computer security software, computer antivirus, anti-spam, anti-malware and anti-ransomware software; portable computer hardware, peripherals and USB drives containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; computer peripherals; computer peripheral devices; computer network switches

Goods & Services
Class 009: Computer hardware; computer networking hardware; computer hardware, namely, firewalls; downloadable computer security software; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; downloadable computer software and hardware for monitoring, segmenting and locking down data and computers; downloadable computer software for securing industrial machinery, industrial control systems and manufacturing; IOT security software; downloadable security software for Industrial Control Systems (ICS); web consoles; downloadable computer software for network and device security; downloadable virtual server software; downloadable computer utility software; downloadable computer software for application whitelisting and blacklisting; downloadable computer software for providing virus and malware pattern updates; downloadable computer software for computer network management and configuration; downloadable computer software for managing computer hardware, switches and routers; USB flash drives; portable computer security hardware; portable computer hardware, peripherals and USB drives containing computer security software, computer antivirus, anti-spam, anti-malware and anti-ransomware software; portable computer hardware, peripherals and USB drives containing computer software for use in scanning for, identifying, reporting and removing malware, viruses; computer peripherals; computer peripheral devices; computer network switches

Goods & Services
Class 042: software as a service (SAAS) services featuring computer security software; providing online non-downloadable computer security software; software as a service (SAAS) services featuring computer firewall software; providing online non-downloadable computer firewall software; software as a service (SAAS) services featuring computer software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for securing, monitoring and protecting data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer and network security policy management and enforcement; providing online non-downloadable software for computer and network security policy management and enforcement; software as a service (SAAS) services featuring computer software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; providing online non-downloadable software for scanning for, identifying, patching and repairing security breaches in data, computers, computer and communication networks, and network endpoints; software as a service (SAAS) services featuring computer software for monitoring, segmenting and locking down data and computers; software as a service (SAAS) services featuring computer software for securing industrial machinery, industrial control systems and manufacturing; providing online non-downloadable software for securing industrial machinery, industrial control systems and manufacturing; software as a service (SAAS) services featuring IOT security software; providing online non-downloadable IOT security software; software as a service (SAAS) services featuring security software for Industrial Control Systems (ICS); providing online non-downloadable security software for Industrial Control Systems (ICS); software as a service (SAAS) services featuring computer software for network and device security; providing online non-downloadable software for network and device security; software as a service (SAAS) services featuring computer utility software; providing online non-downloadable computer utility software; software as a service (SAAS) services featuring computer software for application whitelisting and blacklisting; providing online non-downloadable software for application whitelisting and blacklisting; software as a service (SAAS) services featuring computer software for providing virus and malware pattern updates; providing online non-downloadable software for providing virus and malware pattern updates; software as a service (SAAS) services featuring computer software for computer network management and configuration; providing online non-downloadable software for computer network management and configuration; software as a service (SAAS) services featuring computer software for managing computer hardware, switches and routers; providing online non-downloadable software for managing computer hardware, switches and routers; software as a service (SAAS) services featuring web consoles; providing online non-downloadable software, namely, web consoles; design and development of computer hardware and software; custom configuration of computer software, computer hardware and computer networks; developing and deploying customized computer hardware and software in the fields of computer software, data and network security; technical support services, namely, troubleshooting and remediation of computer software, SAAS, computer hardware and network problems; technical support services, namely, computer network security incident response and remediation services; technical support services in the fields of computers, computer hardware, computer networks, network security and network architecture; technical support services in the fields of industrial control systems and manufacturing security, IOT security hardware and software

Goods & Services
computer hardware; downloadable computer security software; computer hardware, namely, firewalls; downloadable computer firewall software; downloadable computer software and hardware for use in securing, monitoring and protecting data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for use in computer and network security policy management and enforcement; downloadable computer software and hardware for scanning for, identifying, reporting on, patching and repairing security breaches in data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for monitoring data, computers, computer and communication networks and network endpoints; downloadable computer software and hardware for segmenting and protecting data, computers, computer and communication networks and network endpoints









