09
Computer hardware; computer software, namely, software for
the creation of firewalls, software for security analytics,
software for use by security analysts to facilitate the
search and analysis of data related to cyber and real-world
threats, software for network security, load balancing, and
routing, software for web, hardware, network, computer and
internet security, software for monitoring and/or
controlling access to sites and locations on a global
computer network, software that enables safe, secure and
simultaneous data movement within and between computer
networks, software that enables, controls and audits sharing
of information across computer networks, software that
enables users to enable and control access to computers,
computer networks, data, documents and other software
applications with multiple and differing access criteria,
and software that provides users with simultaneous access to
multiple computer networks; computer software for security
and protection, namely, software for providing web security
and protection, providing e-mail messaging security and
protection, and for data loss prevention; computer software
for the security and protection of data, networks and
communications; downloadable electronic publications,
namely, reference manuals, user guides, instructional
guides, application notes and product specifications related
to the foregoing
42
Providing computer software services, namely, web, hardware,
network, computer and internet security services by
restricting and monitoring access to unauthorized areas in a
global computer network or any other publicly accessible
computer network for the purposes of promoting security and
the computer user's productivity, by restricting access to
and by computers to web sites, and by providing email
messaging security and electronic data security; providing
temporary use of non-downloadable computer software, namely,
software for the creation of firewalls, software for
security analytics, software for use by security analysts to
facilitate the search and analysis of data related to cyber
and real-world threats, software for network security, load
balancing, and routing, software for web, hardware, network,
computer and internet security, software for monitoring
and/or controlling access to sites and locations on a global
computer network, software that enables safe, secure and
simultaneous data movement within and between computer
networks, software that enables, controls and audits sharing
of information across computer networks, software that
enables users to enable and control access to computers,
computer networks, data, documents and other software
applications with multiple and differing access criteria,
and software that provides users with simultaneous access to
multiple computer networks; providing temporary use of
non-downloadable computer software for security and
protection, namely, software for use in maintaining and
monitoring web security, data security and e-mail security;
software as a service (SaaS) services, namely, hosting cloud
and datacenter infrastructure software for use by others in
relation to security and protection computer software; cloud
computing services featuring computer software for use in
security and protection; providing non-downloadable computer
software services for the security and protection of data,
networks, and communications