09
Computer hardware; computer hardware for management of
computer networks, wireless networks, and endpoint security;
computer servers used for network security and management;
downloadable computer software for network security, namely,
firewall, unified threat management and virtual private
network capabilities in the fields of security monitoring,
identification of malware and spam, access control,
information flow control, and facilitating computer
connections for local area, wide area and global computer
networks, and manuals sold as a unit; recorded and
downloadable computer software for management of computer
networks and wireless access points; recorded and
downloadable computer software for management of traffic on
computer networks; recorded and downloadable computer
software for management of other computer applications on a
computer network; recorded and downloadable computer
software providing a graphical user interface for management
of networked servers; recorded and downloadable computer
software for management and analysis of use of wireless
networks by users; recorded and downloadable computer
software used for protection and management of confidential
data and personally identifiable information; recorded and
downloadable computer database management software for
enabling secure access to stored data, providing data
storage options, and for identifying and reporting network
security threats, issues, and trends; recorded and
downloadable computer software enabling users to set
security policies for computer networks and network
administration tasks; recorded and downloadable computer
software for use in providing network security alerts;
recorded and downloadable computer network management
software for use in providing historical reports of jitter,
packet loss, and latency, allowing administrators to better
troubleshoot network connections
42
Technical support for computer system access and security
services, namely, remote and on-site monitoring of
technological functions of local area, wide area, and global
computer network systems and providing backup computer
programs and facilities in the areas of security, access
control, information flow control, and computer connection;
computer security services, namely, restricting unauthorized
access to computer networks; providing online
non-downloadable software for use in identifying malware
attacks; providing online non-downloadable software for use
in detecting malicious websites, botnets, and wireless
access points; providing online non-downloadable software
for use in managing traffic on a computer network; online
computer services, namely, providing spam filtering services
to protect websites and online applications from receiving
unsolicited messages; providing online non-downloadable
software for management of computer software applications on
a user's network; providing online non-downloadable computer
software for visualization of connected devices and wireless
access points; providing online non-downloadable software
for monitoring, managing, and anonymizing personally
identifying information and protecting confidential data on
computer networks; computer security consulting services in
the field of threat detection; computer security services,
namely, preventing unwanted access and identification of
malware and spam; computer security services, namely,
monitoring of computer systems for purposes of detecting and
reporting network security threats, issues, and trends;
providing online, non-downloadable cloud based software
enabling users to set security policies for computer
networks and network administration tasks; providing online
non-downloadable software for use in providing network
security alerts; providing online non-downloadable computer
network management software for use in providing historical
reports of jitter, packet loss, and latency, allowing
administrators to better troubleshoot network connections