9
Computer software; computer hardware; computer control hardware; computers and computer equipment; computer peripheral devices; computer security and protection systems; computer antivirus software; computer maintenance software; computer optimization software; computer software for providing intrusion detection and prevention; computer software for providing network, Internet, and computer security; computer software for providing online identity protection; computer software for connecting and managing remote computers, for implementing computer, software and network security measures for remote computer users; computer software for the creation of virtual private network; firewall software; downloadable computer software; Downloadable anti-piracy software; Downloadable anti-spyware software; Downloadable cloud-based software for controlling application access to data; Downloadable communication software for providing access to the Internet; Downloadable communications software for connecting applications to data; Downloadable computer software and firmware for controlling application access to data; Downloadable computer software designed to be deployed on web servers for controlling application access to data; Downloadable computer software development tools; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorizing access to data bases; Downloadable computer software for authorizing access to databases; Downloadable computer software for computer system and application development, deployment and management; Downloadable computer software for controlling and managing access server applications; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer anti-virus software; Downloadable interactive software for controlling application access to data; Downloadable middleware for software application integration; Downloadable middleware for controlling application access to data; Downloadable network access server operating software; Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications
37
Computer installation services; maintenance and repair of hardware; maintenance and repair of security systems
42
Providing information about computer software; computer design and development services; Internet security consultation; electronic storage of data; computer hardware and software consultation; computer consultation regarding computer networks and internal computer networks; design and development of computer hardware and software; advisory services relating to computer hardware, computer programming services; computer software analysis; computer systems analysis, computer systems design; computer engineering consultancy services; computer firewall services; data security services (firewalls); computer network services; computer security services; computer security consultancy; computer security engineering; identity validation (computer security); internet security consultancy; network security services; computer virus protection services; information technology services; security assessment services for computer networks; hosting of software as a service (SaaS); software as a service (SaaS); computerised business information storage; computerised data storage services; development of systems for storage of data; electronic data storage; cloud computing services; providing virtual computer systems through cloud computing; cloud seeding; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting of industrial process control computer software problems; Technical support, namely, providing computer facilities for the electronic storage of digital data; Software as a service (SAAS) services featuring software for cyber security, including, software that, disables the access of user defined programs to other programs in a user device; Software as a service (SAAS) services featuring software in the field of cyber security, including, software that, disables the access of user defined programs to other programs in a user device; Consulting in the field of IT project management; IT consulting services; Computer services, namely, remote management of information technology (IT) systems of others comprised of software applications; Computer services, namely, remote management of information technology (IT) systems of others comprised of hardware applications; Computer services, namely, on-site management of information technology (IT) systems of others comprised of software applications; Computer services, namely, on-site management of information technology (IT) systems of others comprised of hardware applications; Computer services, namely, remote management of the information technology (IT) systems of others; Information technology consulting services; Software as a service (SAAS) services featuring cloud based software for cyber security, including, software that detects, disables and reports unauthorized software and uses a complex set of rules to determine what can be executed on a computer network, and stops anything that has not been approved before it can execute; monitoring of computer systems for security purposes; providing information in the fields of computer and internet security; computer security system monitoring services
45
Computer licensing; licensing of computer firmware; licensing of computer programs; identity verification services [personal background investigations]; Providing consultation to third parties in the field of prevention of data theft