9
Computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer software for encryption; downloadable computer data-security programs; computer software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; downloadable electronic publications and data in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices
42
Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; providing a website featuring non-downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Computer services for software protection; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Computer security services, Namely technical enforcement, restriction and control of access rights for users of computer resources for cloud, mobile or network resources; Monitoring of computer systems for security purposes