9
Computer hardware; computer network security appliances; UTM (unified threat management) appliances (computer hardware and software); software; computer security software; firewalls (computer hardware and software); computer hardware and software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer hardware and software for use in monitoring, inspecting, analyzing and reporting on data traffic on computer networks; computer hardware and software for identifying, tracking, and analyzing security threats to computers, computer data and computer systems; computer hardware and software for identifying malicious content, communications and computer and network behavior threatening computers and computer networks; computer hardware and software for detecting and responding to advanced persistent threats and targeted security attacks; computer hardware and software for identifying and protecting against spam and unsolicited or unauthorized messages; computer hardware and software for establishing, monitoring and enforcing policies for accessing and using computers, computer software, computer networks and mobile devices; computer hardware and software for assessing and blocking access to web sites, emails or data files; computer hardware and software for use in remote management of computers, computer networks and mobile devices
42
Application service provider [ASP], namely, hosting computer software applications; Software As A Service (SAAS); Providing temporary use of non-downloadable computer programs