42
Computer consultation in the field of computer security;
computer security consultancy; computer security consultancy
in the field of scanning and penetration testing of
computers and networks to assess information security
vulnerability; computer security service, namely,
restricting access to and by computer networks to and of
undesired web sites, media and individuals and facilities;
maintenance of computer software relating to computer
security and prevention of computer risks; updating of
computer software relating to computer security and
prevention of computer risks; consulting in the field of
information technology; computer consultation in the field
of computer and network security; software as a service
(SaaS) services featuring software in the field of computer
and network security; software as a service (SaaS) services,
namely, hosting software for use by others for detecting,
blocking, and removing computer viruses and threats;
application service provider (asp) featuring
non-downloadable computer software for use in computer and
network security; computer security consultancy, namely,
developing plans for improving computer and network security
and preventing criminal activity for businesses and
governmental agencies; cloud computing featuring software
for use in computer and network security; cloud computing
services in the field of computer and network security;
computer services, namely, acting as an application service
provider in the field of knowledge management to host
computer application software for creating databases of
information and data related to malware and computer and
network security; computer services, namely, online
scanning, detecting, quarantining, and eliminating viruses,
worms, trojans, spyware, adware, malware and unauthorized
data and programs on computers, networks, and electronic
devices; computer systems analysis; implementing plans for
improving computer and network security and preventing
criminal activity for businesses and governmental agencies,
namely, identifying malware on computer systems,
identification of the source and genealogy of malware and
identifying the objectives of computer system attackers
(term considered too vague by the International Bureau -
Rule 13 (2) (b) of the Regulations)