09
Downloadable computer software for computer and network
security
42
Computer consultation; consulting in the field of
information technology; computer consultation in the field
of computer and network security; computer security
consultancy in the field of scanning and penetration testing
of computers and networks to assess information security
vulnerability; software as a service (SAAS) services
featuring software in the field of computer and network
security; software as a service (SAAS) services, namely,
hosting software for use by others for detecting, blocking,
and removing computer viruses and threats; application
service provider (ASP) featuring non-downloadable computer
software for use in computer and network security;
maintenance and updating of computer software relating to
computer and network security and prevention of computer
risks; computer security consultancy, namely, developing
plans for improving computer and network security and
preventing criminal activity for businesses and governmental
agencies; cloud computing featuring software for use in
computer and network security; cloud computing services in
the field of computer and network security; computer
services, namely, acting as an application service provider
in the field of knowledge management to host computer
application software for creating databases of information
and data related to malware and computer and network
security; computer services, namely, online scanning,
detecting, quarantining, and eliminating viruses, worms,
Trojans, spyware, adware, malware and unauthorized data and
programs on computers, networks, and electronic devices;
computer systems analysis; implementing plans for improving
computer and network security and preventing criminal
activity for businesses and governmental agencies, namely,
identifying malware on computer systems, identification the
source and genealogy of malware, and identifying the
objectives of computer system attackers
45
Monitoring of computer systems for security purposes;
provision of systems for the management of computer and
network threats, namely, surveillance and monitoring of
vulnerability and security problems in computer hardware,
networks, and software; implementing plans for improving
computer and network security and preventing criminal
activity for businesses and governmental agencies, namely,
computer security assurance, administration of digital keys
and digital certificates, providing fraud detection services
for electronic funds transfer, and credit and debit card and
electronic check transactions via a global computer network
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen