9
Downloadable programs for analyzing whether computer systems have been breached; Downloadable programs for analyzing whether local area networks have been breached; Downloadable programs for collecting and filtering networking behavior records of computers; Downloadable programs for detecting malware infection; Downloadable programs for monitoring computer networking behaviors; Downloadable software; Downloadable software for analyzing and detecting attacker invasion; Downloadable software for analyzing whether computer systems have been breached; Downloadable software for analyzing whether local area networks have been breached; Downloadable software for collecting and filtering networking behavior records of computers; Downloadable software for detecting malware infection; Downloadable software for monitoring computer networking behaviors; Downloadable software platforms for analyzing and detecting attacker invasion; Downloadable software platforms for analyzing whether computer systems have been breached; Downloadable software platforms for analyzing whether local area networks have been breached; Downloadable software platforms for collecting and filtering networking behavior records of computers; Downloadable software platforms for detecting malware infection; Downloadable software platforms for monitoring computer networking behaviors; Recorded computer operating programs; Recorded programs for analyzing and detecting attacker invasion; Recorded programs for analyzing whether computer systems have been breached; Recorded programs for analyzing whether local area networks have been breached; Recorded programs for collecting and filtering networking behavior records of computers; Recorded programs for detecting malware infection; Recorded programs for monitoring computer networking behaviors; Recorded software for analyzing and detecting attacker invasion; Recorded software for analyzing whether computer systems have been breached; Recorded software for analyzing whether local area networks have been breached; Recorded software for collecting and filtering networking behavior records of computers; Recorded software for detecting malware infection; Recorded software for monitoring computer networking behaviors; Recorded software platforms; Recorded software platforms for analyzing and detecting attacker invasion; Recorded software platforms for analyzing whether computer systems have been breached; Recorded software platforms for analyzing whether local area networks have been breached; Recorded software platforms for collecting and filtering networking behavior records of computers; Recorded software platforms for detecting malware infection; Recorded software platforms for monitoring computer networking behaviors; Recorded software, namely, monitors; Downloadable programs for analyzing and detecting attacker invasion
42
Cloud computing services; Computer programming services for data processing; Computer security consultancy; Computer software consultancy; Computer software design; Computer system analysis; Computer virus, malware, worms, trojans, spyware, adware, ransomware and data exfiltration protection services; Data encryption services; Data security consultancy; Internet security consultancy; Maintenance of computer software; Monitoring of computer systems by online scanning, machine learning and digital forensics technology; Monitoring of computer systems by remote access; Monitoring of computer systems for detecting data breach; Monitoring of computer systems for detecting unauthorized access; Monitoring of computer systems to detect breakdowns; Network security administration service; Network security administration services, namely, restricting computer networks to access malicious domains; Network security administration services, namely, restricting computer networks to access malicious web sites; Platform as a service, namely, PaaS; Software as a service, namely, SaaS; Updating of computer software