09
Computer hardware; downloadable computer software, namely,
downloadable software for the creation of firewalls,
downloadable software for security analytics, downloadable
software for use by security analysts to facilitate the
search and analysis of data related to cyber and real-world
threats, downloadable software for network security, load
balancing, and routing, downloadable software for web,
hardware, network, computer and internet security,
downloadable software for monitoring and/or controlling
access to sites and locations on a global computer network,
downloadable software that enables safe, secure and
simultaneous data movement within and between computer
networks, downloadable software that enables, controls and
audits sharing of information across computer networks,
downloadable software that enables users to enable and
control access to computers, computer networks, data,
documents and other software applications with multiple and
differing access criteria, and downloadable software that
provides users with simultaneous access to multiple computer
networks; recorded computer software, namely, recorded
software for the creation of firewalls, recorded software
for security analytics, recorded software for use by
security analysts to facilitate the search and analysis of
data related to cyber and real-world threats, recorded
software for network security, load balancing, and routing,
recorded software for web, hardware, network, computer and
internet security, recorded software for monitoring and/or
controlling access to sites and locations on a global
computer network, recorded software that enables safe,
secure and simultaneous data movement within and between
computer networks, recorded software that enables, controls
and audits sharing of information across computer networks,
recorded software that enables users to enable and control
access to computers, computer networks, data, documents and
other software applications with multiple and differing
access criteria, and recorded software that provides users
with simultaneous access to multiple computer networks;
downloadable computer software for security and protection,
namely, downloadable software for providing web security and
protection, providing e-mail messaging security and
protection, and for data loss prevention; recorded computer
software for security and protection, namely, recorded
software for providing web security and protection,
providing e-mail messaging security and protection, and for
data loss prevention; downloadable computer software for the
security and protection of data, networks and
communications; recorded computer software for the security
and protection of data, networks and communications;
electronic downloadable publications, namely, reference
manuals, user guides, and product specifications in the
field of cybersecurity
42
Providing computer software services, namely, web, hardware,
network, computer and internet security services by
restricting and monitoring access to unauthorized areas in a
global computer network or any other publicly accessible
computer network for the purposes of promoting security and
the computer user's productivity, by restricting access to
and by computers to web sites, and by providing email
messaging security and electronic data security; providing
temporary use of non-downloadable computer software, namely,
software for the creation of firewalls, software for
security analytics, software for use by security analysts to
facilitate the search and analysis of data related to cyber
and real-world threats, software for network security, load
balancing, and routing, software for web, hardware, network,
computer and internet security, software for monitoring
and/or controlling access to sites and locations on a global
computer network, software that enables safe, secure and
simultaneous data movement within and between computer
networks, software that enables, controls and audits sharing
of information across computer networks, software that
enables users to enable and control access to computers,
computer networks, data, documents and other software
applications with multiple and differing access criteria,
and software that provides users with simultaneous access to
multiple computer networks; providing temporary use of
non-downloadable computer software for security and
protection, namely, software for use in maintaining and
monitoring web security, data security and e-mail security;
software as a service (SaaS) services, namely, hosting cloud
and datacenter infrastructure software for use in computer
security and restricting access to computers and web sites;
cloud computing services featuring computer software for use
in security and protection, namely, software for restricting
and monitoring access to a global computer network or any
other publicly accessible computer network for the purposes
of promoting security and the computer user's productivity,
by restricting access to and by computers to web sites, and
by providing email messaging security and electronic data
security, software for the creation of firewalls, software
for security analytics, software for use by security
analysts to facilitate the search and analysis of data
related to cyber and real-world threats, software for
network security, load balancing, and routing, software for
web, hardware, network, computer and internet security,
software for monitoring and/or controlling access to sites
and locations on a global computer network, software that
enables safe, secure and simultaneous data movement within
and between computer networks, software that enables,
controls and audits sharing of information across computer
networks, software that enables users to enable and control
access to computers, computer networks, data, documents and
other software applications with multiple and differing
access criteria, and software that provides users with
simultaneous access to multiple computer networks; providing
temporary use of online non-downloadable computer software
for the security and protection of data, networks, and
communications
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen