09
Computer hardware; wireless access points; computer
software, computer programs, and downloadable mobile
applications for use in managing, monitoring, protecting,
authenticating, and securing data, endpoints, computer
systems, computer networks, servers, the Internet, and
mobile devices; computer software, computer programs, and
downloadable mobile applications for enforcing data
policies; computer anti-virus software; computer
anti-malware software; computer anti-spam software; computer
anti-adware software; computer anti-spyware software;
computer software for encryption; downloadable computer
data-security programs; computer software for use in
threat-reduction scanning of data, e-mails, electronic
files, instant messages, web sites, software, programs,
computer systems, and endpoints; computer compliance
software; computer software for use in Internet content
filtering, secure Internet content management, Internet
content-checking, and data content checking; network
monitoring hardware and software; downloadable computer
software for managing, configuring, installing, and
uninstalling software applications and data; downloadable
computer software for IT infrastructure and cyber security
automation; downloadable electronic publications and data in
the field of data security and security of endpoints,
computer systems, computer networks, servers, the Internet
and mobile devices; mouse pads, webcam covers, USB hardware,
mobile phone battery chargers, mobile phone cases; parts,
fittings and accessories for all of the aforesaid goods
41
Education; providing of training; educational services;
conducting educational technical demonstrations,
presentations, workshops, and training seminars, all in the
fields of information technology, computers, data security,
computer security, and network security and distribution of
training materials in connection therewith; information,
consultancy and advisory services relating to the aforesaid
42
Software authoring; computer services for the protection of
software; data security services; computer software
technical support services; troubleshooting of computer
software problems; technical advice related to computer and
network security; installation, maintenance and repair of
computer software; computer security consultancy; computer
software consulting services; computer technology consulting
services; computer security consultancy services;
consultancy in the design and development of computer
hardware; computer software, hardware, firmware, network,
and computer security consulting services; providing
on-line, non-downloadable software for use in managing,
monitoring, protecting, authenticating, and securing data,
endpoints, computer systems, computer networks, servers, the
Internet, and mobile devices; providing on-line,
non-downloadable software for enforcing data policies;
providing on-line, non-downloadable software for encryption;
providing on-line, non-downloadable computer compliance
software; providing on-line, non-downloadable software for
use in Internet content filtering, secure Internet content
management, Internet content-checking, and data content
checking; software as a service (SAAS) services featuring
software for use in managing, monitoring, protecting,
authenticating, and securing data, endpoints, computer
systems, computer networks, servers, the Internet, and
mobile devices; platform as a service (PAAS) services
featuring software for use in managing, monitoring,
protecting, authenticating, and securing data, endpoints,
computer systems, computer networks, servers, the Internet,
and mobile devices; cloud computing featuring software for
use in managing, monitoring, protecting, authenticating, and
securing data, endpoints, computer systems, computer
networks, servers, the Internet, and mobile devices;
computer development services; computer programming
services; computer virus protection services; computer
security services by way of notification of unauthorized
electronic messages and related computer attacks; computer
security services; computer security services in the nature
of enforcing, restricting and controlling access privileges
of users of computing resources for cloud, mobile or network
resources based on assigned credentials; providing
information on data security, and computer security;
troubleshooting of computer software problems; technical
advice related to computer and computer network security;
computer software technical support services; monitoring of
computer systems for security purposes; computer services,
namely, hosting an interactive web site that allows
businesses to design, build, manage, modify, test, run, and
publish IT infrastructure and cybersecurity automation;
software as a service (SAAS) services featuring software for
businesses to design, build, manage, modify, test run, and
publish system installation and configuration automation;
technology consulting services in the field of cloud
computing; technology consulting services in the field of
cybersecurity; technology consulting services in the field
of IT infrastructure and cybersecurity automation; providing
information in the field of security, via a website;
providing on-line commercial orders in the field of computer
hardware and computer software, via a website; tracking,
monitoring, and reporting for purposes of protecting against
data theft, identity theft and fraud; information,
consultancy and advisory services relating to the aforesaid
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen