9
Scientific, research, navigation, surveying, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; computer software; computers and computer peripheral devices; computer hardware; software; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; authentication software; cloud computing software; security software; cloud servers; computer network server; computer networks; computer software; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer software for web content filtering; computer software packages; cryptography software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; encryption software; local area networks; network access server operating software; network management software; proxy server software; VPN (virtual private network) operating software; VPN (virtual private network) hardware; email software; electronic mail terminals; electronic mail servers; software for ensuring the security of electronic mail; encryption apparatus; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encryption; computer software for identity security; computer software for authentication and identity management information security; Computer software for use in computer network access control; Computer software for monitoring the use of computers and the internet by children; Computer software for use in migrating between different computer network operating systems; Computer hardware modules for use with the Internet of Things [IoT]; computer software for use in monitoring computers and websites for security purposes; Computer software for use in computer access control; Computer software for use in providing multiple user access to a global computer information network; computer software for use in vulnerability scanning of networks and websites; all the aforementioned goods being exclusively related to the operation of virtual private networks (VPN)
38
Message sending; communications by telephone; communications by cellular phones; providing access to databases; transmission of electronic mail; information about telecommunication; providing private and secure real time electronic transmission communication over a computer network; Providing virtual private network (VPN) services; Communication via virtual private networks; all the aforementioned services being exclusively related to the operation of virtual private networks (VPN)
42
Cloud computing featuring software for use in enabling network connection access using ip address; computer programming; computer programming and software design; computer security consultancy; Computer services; Webhosting; Web hosting; Server hosting; Hosting websites; Maintaining an on line web site for others featuring technology that enables running the software of others; computer technology consultancy; consultancy in the design and development of computer hardware; creating and maintaining web sites for others; data conversion of computer programs and data, not physical conversion; Engineering services; Technical project planning; Technical project planning in the field of engineering; Technical planning and technical project management for the development of lighting equipment; Design engineering of lines for the processing of web products; hosting the web sites of others on a computer server for a global computer network; maintenance of computer software; outsource service providers in the field of information technology; providing information on computer technology and programming via a web site; research and development of new products for others; scientific research; server hosting; technical surveying; updating of computer software; all the aforementioned services being exclusively related to the operation of virtual private networks (VPN)
45
Legal services; licensing of computer software [legal services]; licensing of databases; licensing of trademarks [legal services]; registration of domain names [legal services]; software licensing; security services; all the aforementioned services being exclusively related to the operation of virtual private networks (VPN)