09
Computer software for administration, monitoring, and
management of information technology (IT), information
technology (IT) infrastructure, networks, systems, computer
devices, servers, applications, and information technology
(IT) security; computer software for accessing, modifying,
and controlling information technology (IT), information
technology (IT) infrastructure, networks, systems, computer
devices, servers, applications, and information technology
(IT) security; computer software for remotely accessing,
modifying, and controlling information technology (IT),
information technology (IT) infrastructure, networks,
systems, computer devices, servers, applications, and
information technology (IT) security; computer software for
administration, monitoring, and management of email;
anti-virus computer software; computer software for data
backup, recovery, restoration, continuity, and
synchronization; computer software for the automation of
administration, monitoring, and management of information
technology (IT), information technology (IT) infrastructure,
networks, systems, computer devices, systems, servers,
applications, and software; computer software for the remote
deployment of software; computer software for managing
computer network security and predicting and monitoring
security threats or vulnerabilities of information
technology (IT), information technology (IT) infrastructure,
networks, systems, computer devices, systems, servers,
applications, and software computer networks; computer
software for security and data protection; anti-virus
computer software, computer software for data security and
protection; computer software for e-commerce protection;
computer software for intrusion detection; computer software
for data transfer protection
42
Providing non-downloadable computer software for
administration, monitoring, and management of information
technology (IT), information technology (IT) infrastructure,
networks, systems, computer devices, servers, applications,
information technology (IT) security, information technology
(IT) help desk and technology support services, and
software; providing non-downloadable computer software for
accessing, modifying, and controlling information technology
(IT), information technology (IT) infrastructure, networks,
systems, computer devices, servers, applications,
information technology (IT) security, information technology
(IT) help desk and technology support services, and
software; providing non-downloadable computer software for
remotely accessing, modifying, and controlling information
technology (IT), information technology (IT) infrastructure,
networks, systems, computer devices, servers, applications,
information technology (IT) security, information technology
(IT) help desk and technology support services, and
software; providing non-downloadable computer software for
information technology (IT) help desk and technology support
services; providing non-downloadable computer software for
administration, monitoring, and management of email;
providing non-downloadable anti-virus computer software;
providing non-downloadable computer software for data
backup, recovery, restoration, continuity, and
synchronization; providing technical support services,
namely, troubleshooting in the nature of diagnosing computer
hardware and software problems; providing information
technology service management and information technology
operations management for others; application service
provider in the field of information technology to host
computer application software for the purpose of
administration, monitoring, and management of information
technology (IT), information technology (IT) infrastructure,
networks, systems, computer devices, servers, applications,
and software; debugging, maintenance, and updating of
software for others; providing non-downloadable computer
software for the automation of administration, monitoring,
and management of information technology (IT), information
technology (IT) infrastructure, networks, systems, computer
devices, servers, applications, and software; providing
non-downloadable computer software for the administration,
monitoring, management, assessment and quantification of
security and data breach vulnerability risks; providing
non-downloadable computer software for the remote deployment
of software; providing non-downloadable computer software
for managing computer network security and predicting and
monitoring security threats or vulnerabilities of
information technology (IT), information technology (IT)
infrastructure, networks, systems, computer devices,
systems, servers, applications, and software computer
networks; providing non-downloadable computer software for
security and data protection