09
Computer software and hardware for digital security;
computer security products, namely, computer peripherals;
computer hardware and software, namely, network security
appliances, email security appliances, digital data and
media security appliances, security software applications,
and management stations related to the foregoing; computer
software and computer hardware for detection, blocking, and
facilitating removal and remediation of computer malware,
cyber-attacks, malicious attacks, and advanced persistent
threats; computer software for identifying and preventing
malicious attacks on, and unauthorized activities and
intrusions in computers, computer systems, networks,
hardware, software applications, digital devices, and mobile
devices; computer software and hardware providing secure
networks, virtual computer systems and virtual computer
environments; computer hardware; computer peripherals;
software application that provides Internet users with
information on data collection practices and the ability to
view and block the tracking settings, web bugs, web
trackers, widgets and advertising services associated with
websites visited; software application for use in managing
advertising campaigns; software for use in verifying legal
compliance with online advertising guidelines; software for
use in managing online consumer privacy issues; computer
software that performs collection of security telemetry into
a big data system and analyzes it based on multiple
algorithms; computer software that combines security
telemetry data received from control points within an
enterprise's IT environment and global cyber security threat
data into a single unified platform; security analytics
software for monitoring network security and identifying
threats and vulnerabilities
42
Technical support and consulting services related to
security and vulnerability of, and cyber-attacks and threats
against computers, computer systems, networks, hardware,
software applications, digital devices, digital data, and
mobile devices; technical consulting services related to
designing, developing, customizing, configuring, deploying,
installing, maintaining, analyzing, integrating, repairing,
and managing of cyber-security systems for others; technical
support services in the nature of detecting and diagnosing
computer hardware and software security problems and
vulnerabilities, updating and maintenance of computer
software relating to computer security and to prevention and
mitigation of computer risks; updating and maintaining
computer software for others; cloud computing services
featuring software and databases for use in computer
security and prevention and mitigation of computer risks;
computer consultation and research in the field of computer
hardware, computer software and network security; computer
security consultancy in the field of malware, intrusion and
penetration testing and diagnosis of computers and networks
to assess information technology security and vulnerability;
information technology security services in the nature of
providing network access to cyber-threat intelligence, to
cyber-attack verification, and to security analysis of
network traffic, emails, files, media computer software, and
mobile applications; application service provider (asp)
featuring software for use for detection, blocking, and
facilitating removal and remediation of computer viruses,
rootkits, advanced persistent threats, malware and malicious
attacks in computers, computer systems, networks, hardware,
software applications, digital devices, and mobile digital
devices; application service provider (asp) featuring
software that provides secure virtual computer systems and
virtual computing environments; internet security services,
namely, globally monitoring and collecting cyber security
intelligence; monitoring of computer systems for security
purposes; providing security threat management systems,
namely, monitoring and tracking of security vulnerabilities
and problems in computer software products, the internet,
and computer networks; computer virus protection services;
development, updating and maintenance of software for
networks and standalone computers in the fields of security,
database management, and anti-virus protection and
monitoring security systems; network and internet security
services; computer consulting services in the field of
security integration, network security, network
architecture, encryption technology, and computer security;
computer consulting services in the field of analyzing
security intelligence data to uncover threats and
prioritize, prevent against future attacks, simplify
management of security data; providing services in the field
of unified security analytics, mainly, to measure, track and
reduce cyber security risks, uncover targeted attack
campaigns, investigate past or current attacks, and identify
anomalous activity across computer networks; security
verification of computer network firewalls, servers and
other network devices from unauthorized access, namely,
analyzing global computer information network and internal
computer network vulnerability; computer consultation in the
field of computer security; providing information in the
field of network and internet security; providing technical
information in the field of computer software applications;
providing technical information in the field of big data
analytics; remote or on-site monitoring of computer systems;
computer services, namely providing information concerning
the encryption and authentication of electronic data;
consultancy services in the fields of digital media, data
encryption, computer security, communication security and
computer software; encryption and decryption of data and
communications; application hosting; web content
categorization and filtering services; computer consultancy
services; computer programming; technical support services,
namely, troubleshooting of computer software problems;
providing information in the fields of global computer
network and electronic network security; notification and
delivery of software updates; electronic document and email
archiving services; providing information in the field of
computer and online security services, via computer
networks, wireless networks and the internet
45
Legal services; security services for the protection of
property and individuals
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen