09
Downloadable computer software, namely, downloadable
computer security software for computer, applications,
cloud, and computer network security, automated domain
threat protection and prevention, analysis, management and
integration of threat data, security information and event
management, detection, investigation and elimination of
computer threats, cyberattacks and data breaches, threat and
intrusion detection and prevention, exploit protection and
prevention, and automated remediation and restoration of
compromised computer software and hardware, downloadable
computer anti-virus, anti-malware, and privacy control
software, downloadable computer software for developing
custom security threat detection, investigation, and
response tools, downloadable computer software for
monitoring applications installed and running on a computer,
computer security audits and performance diagnostics, and
for scanning, removing and blocking computer applications
and files, downloadable computer software for securing,
scanning, authenticating, and encrypting email, documents,
website links, and data, and controlled folder access,
downloadable computer software for securing, scanning,
regulating access, and authenticating software tools,
role-based access, IP addresses, domains, computer
peripherals, and endpoints, downloadable computer security
software for the collection, editing, organizing, modifying,
transmission, processing, storage, analysis, and sharing of
data and information, downloadable computer security
software for the creation, monitoring, and enforcement of
security protocols, credentials, and policies, downloadable
computer software for detecting, analyzing, monitoring,
displaying, and countering computer security threats,
generating security reports, providing security alerts, and
for security compliance, downloadable computer software for
collecting and processing user behavioral signals and
providing insights, analyzing network traffic, endpoint
detections and remediation, attack surfaces reduction,
firewall creation, and responses to security threats,
downloadable computer software for online scanning,
detecting, quarantining, and eliminating of viruses, worms,
trojans, spyware, adware, malware, ransomware, grayware,
phishing attempts, and unauthorized data and programs on
computers, networks, and electronic devices; none of the
aforementioned goods for use in or in relation to vehicles,
residential and commercial security systems, home automation
systems, and security for physical premises, and protective
covers, cases, casings, carrying cases, and chargers for
electronic devices
38
Telecommunication services, namely, electronic transmission,
delivery, and providing access to information for retrieval
of data, messages, images, digital files, documents, and
other data among users of computers, telecommunication
services, namely, electronic transmission, delivery, and
providing access to information for retrieval of data,
messages, images, digital files, documents, and other data
by telecommunications networks, wireless communication
networks, global communications networks, global computer
networks, cloud-based computer networks, and the Internet,
telecommunication services, namely, information transmission
via electronic communications networks, telecommunication
services, namely, transmission of electronic mail and
messaging services, telecommunication services, namely,
providing access to databases and telecommunications access
services, telecommunication services, namely,
telecommunications access services for the collection and
supply of information, telecommunication services, namely,
providing user access to local area computer networks,
global computer networks, computer databases, cloud-based
computer networks, and the Internet, telecommunication
services, namely, electronic transmission of geolocation
data from mobile devices, telecommunication services,
namely, electronic bulletin board services,
telecommunication services, namely, provision of online
electronic communication links which transfer the website
user to other local and global webpages, telecommunication
services, namely, information, advice, and consultancy
services in the field of telecommunications,
telecommunication services, namely, transmission of data,
messages, images, digital files, documents, and other data
via telecommunications network; none of the aforementioned
services for use in or in relation to vehicles, and
residential and commercial security systems, home automation
systems, and security for physical premises
42
Software as a service (SaaS) services, namely, providing
temporary use of online non-downloadable computer security
software for computer, applications, cloud and computer
network security, automated domain threat protection and
prevention, analysis, management and integration of threat
data, security information and event management, detection,
investigation and elimination of computer threats,
cyberattacks and data breaches, threat and intrusion
detection and prevention, exploit protection and prevention,
and automated remediation and restoration of compromised
computer software and hardware, software as a service (SaaS)
services, namely, providing temporary use of online
non-downloadable computer software for anti-virus,
anti-malware, and privacy protection, software as a service
(SaaS) services, namely, providing temporary use of online
non-downloadable computer software for developing custom
security threat detection, investigation, and response
tools, software as a service (SaaS) services, namely,
providing temporary use of online non-downloadable computer
software for monitoring applications installed and running
on a computer, computer security audits and performance
diagnostics, and for removing and blocking computer
applications and files, software as a service (SaaS)
services, namely, providing temporary use of online
non-downloadable computer software for securing, scanning,
authenticating, and encrypting email, documents, website
links, and data, and controlled folder access, software as a
service (SaaS) services, namely, providing temporary use of
online non-downloadable computer software for securing,
scanning, regulating access, and authenticating software
tools, role-based access, IP addresses, domains, computer
peripherals, and endpoints, software as a service (SaaS)
services, namely, providing temporary use of online
non-downloadable computer security software for the
collection, editing, organizing, modifying, transmission,
processing, storage, analysis, and sharing of data and
information, software as a service (SaaS) services, namely,
providing temporary use of online non-downloadable computer
security software for the creation, monitoring, and
enforcement of security protocols, credentials, and
policies, software as a service (SaaS) services, namely,
providing temporary use of online non-downloadable computer
software for detecting, analyzing, monitoring, displaying,
and countering computer security threats, generating
security reports, providing security alerts, and for
security compliance, software as a service (SaaS) services,
namely, providing temporary use of online non-downloadable
computer software for collecting and processing user
behavioral signals and providing insights, analyzing network
traffic, endpoint detections and remediation, attack
surfaces reduction, firewall creation, and responses to
security threats, software as a service (SaaS) services,
namely, providing temporary use of online non-downloadable
software for online scanning, detecting, quarantining, and
eliminating of viruses, worms, trojans, spyware, adware,
malware, ransomware, grayware, phishing attempts, and
unauthorized data and programs on computers, networks, and
electronic devices; none of the aforementioned services for
use in or in relation to vehicles, and residential and
commercial security systems, home automation systems, and
security for physical premises
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen