09
Computer security software, namely, anti-bot, anti-spam,
anti-phishing, anti-pharming, and anti-spyware software;
anti-bot sensors, anti-spam sensors, anti-phishing sensors,
anti-pharming sensors - all to be used with said software;
computer software for inspecting electronic files to detect
and prevent computer security attacks, computer and email
viruses, spam, spyware, adware and malware; computer
software and hardware for protecting against advanced
persistent threats (APT), botnets and the associated
cybercrimal activity
42
Computer services, namely, filtering of unwanted e-mails and
spam; computer e-mail virus protection services; providing
information updates on security threats to computer
networks; providing online, non-downloadable software for
detecting computer security attacks, computer and email
viruses, spam, spy ware, adware and malware; providing
online, non-downloadable software for protecting computer
networks from computer security attacks, advanced persistent
threats (APT), computer and email viruses, spam, spyware,
adware and malware; providing computer and information
technology security services, namely, developing, updating,
maintaining and providing online databases of illegitimate
sources of electronic communications and sources of computer
and email viruses, spam, spyware, adware and malware;
providing security threat management systems, namely,
monitoring and tracking of security vulnerabilities and
problems in computer software products, the Internet, and
computer networks; providing online, non-downloadable
software for inspecting electronic files to detect and
prevent computer security attacks, computer and email
viruses, spam, spyware adware and malware; computer and
network security services, namely, securing computers,
networks and data against threats; computer system access
and security services, namely, remote and on-site monitoring
of local area, wide area, and global computer network
systems for security purposes, namely, monitoring for and
protecting against spam, malware, viruses, intrusions;
advanced persistent threat (APT), botnet infection, and
unauthorized web access in the areas of computer security,
computer access control, information flow control, and
computer connection security