09
Computer software for design and development of computer
systems and software applications; computer software for
analysis and production of programming code in the field of
software development; computer software development tools;
computer software for visualization of software and design
of computer systems; computer software development tools
used to test, evaluate and improve information and network
security; computer software adapted to increase privacy of
information; computer software adapted to increase security
of information and information technology systems;
information privacy software; information security software;
computer software development tools used to test, evaluate
and improve information and network security; computer
software tools used to test and detect exploitable
weaknesses in software programs; computer software adapted
to detect data security, database intrusions and database
intrusion attempts; computer software adapted to detect and
defeat threats to data security; computer software for
protecting the privacy of data, namely, personal data,
financial data, corporate data, and organizational data;
computer software for improving the reliability,
availability and security of network-based applications, and
networks for proactive service assurance; downloadable
electronic publications, namely, white papers, reports,
datasheets and presentations in the field of network
security, detecting exploitable weaknesses in software
programs, protecting the privacy of data, proactive service
assurance and security risk profile management
16
Printed publications, namely, white papers, reports,
datasheets and presentations in the field of network
security, detecting exploitable weaknesses in software
programs, protecting the privacy of data, proactive service
assurance and security risk profile management
42
Software as a service featuring software to detect threats,
protect data privacy, and test, evaluate and improve
information and computer network security; consultation
services in the field of development and testing of computer
software; hosting a website featuring information regarding
network security, detecting exploitable weaknesses in
software programs, protecting the privacy of data, proactive
service assurance and security risk profile management