9
Downloadable computer software for virtualization management and for virtualization of data, applications, operating systems, web browsers, and user tasks, to enable information, system and network security and to enable application compatibility, delivery and isolation; downloadable computer software, namely, computer software for security, detection and removal of computer viruses, malware activity and threats; downloadable computer software for managing and filtering electronic communications; downloadable computer software for protecting and securing computer networks, applications, desktops, operating systems and data; downloadable computer software for encrypting and authenticating data; downloadable computer software for providing alerts, reports, data, and information regarding application, system and network security; downloadable computer software for off-site network and personal computer monitoring, administration and management, server analysis; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform and managing virtual machines on a cloud computing platform
42
Computer security services, namely, data encryption for protecting the integrity of data and electronic communications over computer network; web browser protection services blocking malicious, untrustworthy and unwanted content and programs; providing temporary use of on-line non-downloadable software for use in the protection of computers against unauthorized third-party access and for computer security and authentication; providing online non-downloadable software for security, detection and removal of computer viruses and threats, and for protecting and securing computer networks and applications; computer co-location services, namely, providing facilities for the location of computer servers with the equipment of others; computer services, namely, providing virtual and non-virtual application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers of variable capacity to third party computing and data storage facilities; hosting the software, websites and other computer applications of others on a virtual private server; providing virtual computer systems and virtual computer environments through cloud computing; computer security threat analysis for protecting data; rental of computers relating to computer security and prevention of computer risks; computer security services, namely, restricting unauthorized access to computer networks; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials