09
Downloadable computer search engine software; downloadable
enterprise software in the nature of a database for
non-transactional data and a search engine for database
content; downloadable computer software for network security
assessment and testing; downloadable computer software for
information security analysis, namely, forensic and auditing
software used to determine security weakness in software and
software applications; downloadable electronic fraud and
identity theft protection computer software; downloadable
software for online fraud protection, namely, providing safe
browsing to users in e-commerce transactions, online
financial transactions and online communications;
downloadable software for identifying and authenticating
users in e-commerce transactions, online financial
transactions and online communications; pre-recorded
computer software for fraud protection by providing safe
browsing to users in e-commerce transactions, online
financial transactions and online communications, recorded
on a usb flash drive; downloadable computer software in the
field of data security for secure network access, data and
software security, encryption; downloadable content
compliance and governance computer software, namely,
downloadable enterprise test management software to create
and manage organizational standards and policies for web
site quality, accessibility, privacy, usability,
searchability and custom quality factors and to verify
compliance with such organizational standards and policies;
downloadable computer software for use in document, data and
information security, protection of documents, data and
information, and encryption of documents, data and
information, and restriction and tracking of access to
documents, data and information; recorded computer software
for computer network security and accessing computer
networks; downloadable computer software for verifying and
correcting web-sites to meet federal accessibility standards
software for use in data security for secure network access,
data and software security, encryption, content compliance
and governance; recorded software for use in compliance
management and risk analysis in the fields of computer and
network security; recorded computer software for use in the
field of computer security; Downloadable software for
integrating and allowing for communication between
electronic fraud, identify theft protection, unauthorized
access detection, and policy and decisioning software
systems; Downloadable computer software for data analytics,
comprehensive data processing, visual analytics, machine
learning and document production for use in digital
investigations, e-discovery, intelligence mining and
corporate communication compliance
35
Providing consumer and business information in the field of
telecommunications products and services
38
Telecommunications services, namely, transmission of voice,
audio, visual images and data by telecommunications
networks, wireless communication networks, the internet,
information services networks and data networks;
telecommunications services, namely, providing network
access points (naps); providing multiple-user access to a
global computer network; providing telecommunications
connections to a global computer network for telecom
hoteling; telecommunications gateway services;
telecommunications routing and junction services; providing
co-location services for voice, video and data
communications applications on internal, extranet and global
computer network servers, for others; leasing
telecommunications equipment, components, systems and
supplies; consulting services in the field of
telecommunications
41
Educational services, namely, providing training in the use
of software in the field of data security
42
Software as a service (saas) services featuring software in
the field of data security for secure network access, data
and software security, encryption, and content compliance
and governance; providing temporary use of an online
non-downloadable software application featuring enterprise
test management software that enables companies to create
and manage organizational standards and policies for web
site quality, accessibility, privacy, usability,
searchability and custom quality factors and to verify
compliance with such organizational standards and policies;
providing temporary use of online non-downloadable software
for use in document, data and information security,
protection of documents, data and information, and
encryption of documents, data and information, and
restriction and tracking of access to documents, data and
information; software as a service (saas) services, namely,
hosting software for use in document, data and information
security, protection of documents, data and information, and
encryption of documents, data and information, and
restriction and tracking of access to documents, data and
information; leasing and rental of computing capacity,
namely, computer software, computer hardware and computer
networking equipment; evaluation of computer systems,
namely, analysis of internal computer systems, extranet
computer systems and global computer network systems, for
others; implementing computer software for others;
designing, developing and monitoring computer networks and
computer systems for others; implementing computer network
and computer system software for others; computer and
network monitoring services, namely, performance reporting,
load balancing, and computer network security services;
managed services, namely, hosting the digital content and
web sites of others on a global computer network; providing
non-downloadable software for accessing and using a cloud
computing network; software as a service (saas), namely,
providing hosted software applications for others for use in
information technology (it) systems and information security
management; application service provider (asp) services,
namely, hosting computer software applications of others;
consulting services in the field of software as a service
(saas); infrastructure as a service (iaas), namely,
providing remotely accessible server computing; providing a
virtual computing environment accessible via the internet
and other computer networks; providing virtual computer
systems and virtual computer environments via cloud
computing; leasing of computer servers; technical consulting
services in the fields of datacenter architecture, public
and private cloud computing solutions, and evaluation and
implementation of internet technology and internet services;
remote administration and management of in-house and hosted
datacenter devices, databases and software applications for
others; computer co-location services, namely, providing
facilities for the location of computer servers with the
equipment of others; providing secure,
environmentally-controlled, facilities and technical
monitoring for the computer servers and telecommunication
and network equipment of others; computer disaster planning
and recovery; design of premises-based, cloud-based and
hybrid unified communications systems; non-downloadable
computer software for compliance management and risk
analysis in the fields of computer and network security;
non-downloadable network security software; nondownloadable
identity verification software; providing temporary use of
nondownloadable network auditing software in the fields of
secure communications and data networks; computer
consultation and providing information in the field of
internet and network security; electronic storage and
archiving of data for others; providing remote cloud-based
server storage to others; data center services, namely,
centralized storage of electronic data for others; technical
consulting services in the field of electronic storage and
archiving of data for others; infrastructure as a service
(iaas), namely, providing remotely accessible storage
capacity; storage services for archiving of electronic data;
monitoring of computers, websites, computer networks and
communications network systems for security purposes;
computer networks and communications network security
services in the nature of intrusion protection, security
threat analysis, managed security services, vulnerability
management and assessment, threat analysis, incident
response and forensics and penetration testing; providing
user authentication services for security purposes to others
in the field of voice and data communication services via
computer network; computer security services in the nature
of the issuance and management of digital certificates and
other security credentials for others; identity as a service
(idaas), namely, providing cloud-based computer network
identification verification, authentication and management
services for security purposes; computer security services,
namely, secure hosted electronic storage of passwords,
digital credentials and electronic identity information
relating to persons, accounts and devices for security
purposes; providing temporary use of online, nondownloadable
software for fraud prevention and access authorization for
verifying a user's true identity, both on-line and on-site,
in the fields of controlling access to information, medical
records, computer systems, websites, online services,
e-commerce and financial transactions; consulting services
in the field of computer security and communications network
security; providing information in the fields of internet,
network, computer and data security, as well as online fraud
and identity theft protection via a website; computer
security consultancy in the field of scanning and
penetration testing of computers and networks to assess
information security vulnerability; computer services,
namely, providing search engines for obtaining data and
information on a global computer network; computer services,
namely, hosting a website featuring a media aggregator and
search engine for internet content; providing a search
engine for information, via a website; provision of internet
search engines; hosting a website featuring on-line
non-downloadable software that enables users to scan
websites and identify malicious code injections, providing
an assessment of the type and risk level of malware attacks
and/or theft of credentials or other data; hosting a website
featuring on-line non-downloadable software that enables
users to obtain malware injection attack visibility by
taking a screenshot of a malware-injected web page,
enhancing attack detection accuracy and assisting in
forensic investigations; providing temporary use of
non-downloadable electronic fraud, identity theft and
cyberattack protection and monitoring software; software as
a service (saas) services featuring software for reporting,
policy analytics and data visualization relating to
domain-based message authentication, reporting and
conference and compliance with applicable standards for
same; providing temporary use of non-downloadable electronic
fraud and identity theft protection software; online
non-downloadable secure software for providing safe browsing
to users in e-commerce transactions, online financial
transactions and online communications; electronic
information security consulting, namely, penetration
testing, review of software application code, and security
analysis of software applications; electronic monitoring of
computer networks for cyber attack incidents and providing
information regarding such incidents; online fraud
protection services, namely, namely electronic monitoring of
personally identifying information and electronic
transaction activity to detect fraud and identity theft via
the internet; computer security services for protecting data
and information from unauthorized access, in the nature of
electronic monitoring of credit reports, Internet traffic
and public records to facilitate the prevention of identity
theft and fraud; electronic fraud protection services,
namely, design and implementation of software and technology
solutions for the purpose of electronic brand monitoring, to
protect against counterfeiting, tampering, and diversion;
electronic identification services, namely, providing user
authentication services using technology for e-commerce
transactions, online financial transactions, and online
communications; providing on-line non-downloadable software
for integrating and allowing for communication between
electronic fraud, identify theft protection, unauthorized
access detection, and policy and decisioning software
systems; software as a service (SAAS) services, namely,
hosting software for use by others for use for integrating
and allowing for communication between electronic fraud,
identify theft protection, unauthorized access detection,
and policy and decisioning software systems; nondownloadable
computer software for data analytics, comprehensive data
processing, visual analytics, machine learning and document
production for use in digital investigations, e-discovery,
intelligence mining and corporate communication compliance;
consulting services in connection with enterprise test
management software that enables companies to create and
manage organizational standards and policies for web site
quality, accessibility, privacy, usability, searchability
and custom quality factors and to verify compliance with
such organizational standards and policies
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen