09
Downloadable computer search engine software; downloadable
enterprise software in the nature of a database for
non-transactional data and a search engine for database
content; downloadable computer software for network security
assessment and testing; downloadable computer software for
information security analysis, namely, forensic and auditing
software used to determine security weakness in software and
software applications; downloadable electronic fraud and
identity theft protection computer software; downloadable
software for online fraud protection, namely, providing safe
browsing to users in e-commerce transactions, online
financial transactions and online communications;
downloadable software for identifying and authenticating
users in e-commerce transactions, online financial
transactions and online communications; recorded computer
software for fraud protection by providing safe browsing to
users in e-commerce transactions, online financial
transactions and online communications, recorded on a usb
flash drive; downloadable computer software in the field of
data security for secure network access, data and software
security, encryption; downloadable content compliance and
governance computer software, namely, downloadable
enterprise test management software to create and manage
organizational standards and policies for web site quality,
accessibility, privacy, usability, searchability and custom
quality factors and to verify compliance with such
organizational standards and policies; downloadable computer
software for providing document, data and information
security, protection of documents, data and information, and
encryption of documents, data and information, and
restriction and tracking of access to documents, data and
information; recorded computer software for computer network
security and accessing computer networks; downloadable
computer software for verifying and correcting web-sites to
meet federal accessibility standards software for use in
data security for secure network access, data and software
security, encryption, content compliance and governance;
recorded computer software for use in compliance management
and risk analysis in the fields of computer and network
security; downloadable software for integrating and allowing
for communication between electronic fraud, identify theft
protection, unauthorized access detection, and policy and
decisioning software systems; downloadable computer software
for data analytics, comprehensive data processing, visual
analytics, machine learning and document production for use
in digital investigations, e-discovery, intelligence mining
and corporate communication compliance
42
Software as a service (SaaS) featuring software in the
fields of data security for secure network access, data and
software security, encryption, and content compliance and
governance; providing temporary use of an online
non-downloadable software application featuring enterprise
test management software that enables companies to create
and manage organizational standards and policies for web
site quality, accessibility, privacy, usability,
searchability and custom quality factors and to verify
compliance with such organizational standards and policies;
providing temporary use of online non-downloadable software
for securing documents, data, and information, protection of
documents, data and information, and encryption of
documents, data and information, and restriction and
tracking of access to documents, data and information;
software as a service (SaaS) services, namely, hosting
software for use by others for use securing documents, data
and information, protection of documents, data and
information, and encryption of documents, data and
information, and restriction and tracking of access to
documents, data and information; evaluation of computer
systems, namely, analysis of internal computer systems,
extranet computer systems and global computer network
systems, for others; implementing computer software systems
for others; designing, developing, implementing and
monitoring computer networks and computer systems for
others; computer and network monitoring services, namely,
monitoring technological functions of websites and computer
network systems for others, load balancing of servers, and
computer network security services in the nature of
enforcing, restricting and controlling access privileges of
users of computing resources for cloud, mobile or network
resources based on assigned credentials, scanning and
penetration testing of computers and networks to assess
information security vulnerability, restricting access to
and by computer networks to and of undesired web sites,
media and individuals and facilities; providing temporary
use of online, non-downloadable software for accessing and
using a cloud computing network; software as a service
(SaaS), namely, hosting software applications for others in
the fields of information technology (IT) systems and
information security management; application service
provider (ASP) services, namely, hosting computer software
applications of others; consulting services in the field of
software as a service (SaaS); technical consulting services
in the fields of datacenter architecture, public and private
cloud computing solutions, and evaluation and implementation
of internet technology and internet services; providing
temporary use of online, non-downloadable computer software
for compliance management and risk analysis in the fields of
computer and network security; providing temporary use of
online non-downloadable network security software; providing
temporary use of online nondownloadable identity
verification software; providing temporary use of online
nondownloadable network auditing software in the fields of
secure communications and data networks; computer
consultation in the nature of consultation about the
maintenance and updating of computer software and computer
technology consultancy and providing technical consulting
information in the field of internet and network security
and secure transmission of data and information; technical
consulting services in the field of electronic storage and
archiving of data for others; infrastructure as a service
(IaaS), namely, providing remotely accessible storage
capacity in the nature of electronic storage of data;
technical support services, namely, remote administration
and management of virtual infrastructure storage; storage
services for archiving of electronic data; providing
information in the field of electronic data storage via a
website; computer security services, namely, monitoring of
computers, websites, computer networks and communications
network systems for security purposes; computer networks and
communications network security services in the nature of
intrusion protection via firewall software, computer
security threat analysis for protecting data, managed IT
system security services in the nature of computer security
consultancy to assess information security vulnerability;
computer security incident response services in the nature
of software as a service services (SaaS) featuring software
for computer security incident mitigation and resolution,
computer forensic services, and penetration testing of
computers and networks to assess information security
vulnerability; providing electronic user authentication
services using software technology for e-commerce
transactions and online software applications to others in
the field of voice and data communication services via
computer networks; computer security services in the nature
of the issuance and validation of digital certificates and
other electronic security credentials in the nature of
electronic access codes for others; identity as a service
(IdaaS), namely, providing cloud-based computer network
identification verification and authentication services via
software technology for security purposes; computer security
services, namely, secure hosted electronic storage of
passwords, digital credentials and electronic identity
information relating to persons, accounts and devices for
security purposes; providing temporary use of online,
nondownloadable software for fraud prevention and access
authorization for verifying a user's true identity, both
on-line and on-site, in the fields of controlling access to
information, medical records, computer systems, websites,
online services, e-commerce and financial transactions;
consulting services in the field of computer security and
communications network security; providing information in
the fields of internet, network, computer and data security,
as well as online fraud and identity theft protection via a
website; computer security consultancy in the field of
scanning and penetration testing of computers and networks
to assess information security vulnerability; computer
services, namely, providing search engines for obtaining
data and information on a global computer network; computer
services, namely, providing non-downloadable media
aggregator software and search engine for internet content
via a website; providing a search engine on the Internet for
information; provision of internet search engines; providing
on-line non-downloadable software that enables users to scan
websites and identify malicious code injections, providing
an assessment of the type and risk level of malware attacks,
theft of credentials, and theft of other forms of personal
data via a website; providing on-line non-downloadable
software via a website that enables users to obtain
malware-injected attack visibility by taking a screenshot of
a malware-injected web page, enhancing attack detection
accuracy and assisting in forensic investigations; providing
temporary use of non-downloadable electronic fraud, identity
theft and cyberattack protection and monitoring software;
software as a service (SaaS) services featuring software for
reporting, policy analytics and data visualization relating
to domain-based message authentication, reporting,
conference, and compliance with applicable standards for the
same; providing temporary use of non-downloadable electronic
fraud and identity theft protection software; providing
online non-downloadable secure software for providing safe
browsing to users in e-commerce transactions, online
financial transactions and online communications; electronic
information security consulting, namely, penetration testing
of computers and networks to assess information security
vulnerability, analysis of software application code, and
computer security threat analysis of software applications
for protecting data; computer security services for
protecting data and information from unauthorized access, in
the nature of electronic monitoring of computer networks for
cyber attack incidents and providing information regarding
such incidents; online fraud protection services, namely,
electronic monitoring of personally identifying information
and electronic transaction activity to detect fraud and
identity theft via the internet; computer security services
for protecting data and information from unauthorized
access, in the nature of electronic monitoring of credit
reports, Internet traffic and public records to facilitate
the prevention of identity theft and fraud; electronic fraud
protection services, namely, design and implementation of
software and technology solutions for the purpose of
electronic brand monitoring, to protect against
counterfeiting, tampering, and diversion; electronic
identification services, namely, providing user
authentication services using technology for e-commerce
transactions, online financial transactions, and online
communications; providing on-line non-downloadable software
for integrating and allowing for communication between
electronic fraud, identify theft protection, unauthorized
access detection, and policy and decision-making software
systems; software as a service (SaaS) services, namely,
hosting software for use by others for integrating and
allowing for communication between electronic fraud,
identify theft protection, unauthorized access detection,
and policy and decision-making software systems; providing
online, nondownloadable computer software for data
analytics, comprehensive data processing, visual analytics,
machine learning and document production for use in digital
investigations, e-discovery, intelligence mining and
corporate communication compliance; consulting services in
connection with enterprise test management software that
enables companies to create and manage organizational
standards and policies for web site quality, accessibility,
privacy, usability, searchability and custom quality factors
and to verify compliance with such organizational standards
and policies
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen