35
Arranging and conducting reward programs to promote the sale
of computer security software and services
42
Software as a service (SaaS) in the fields of information
technology, cybersecurity, and internet enabled devices in
the internet of things (IOT), namely, hosting software for
use by others in predicting, preventing, detecting, and
responding to computer vulnerabilities, viruses, and
threats, and providing protection from computer network
intrusions; platform as a service (PaaS), namely, providing
non-downloadable computer software for use in cybersecurity
and prevention of attacks and threats to minimize risk;
cloud computing services, namely, hosting software for use
by others in the field of cybersecurity; computer services,
namely, creating an on-line community for registered users
to collaborate on cybersecurity software and prevention
measures and share technical information and advice on
cybersecurity; computer services, namely, monitoring and
managing the computer networks of others to provide
protection from computer and network intrusions and attacks
in connection with computer and network security systems,
internet enabled devices in the internet of things (IOT);
computer services, namely, detecting, identifying,
quarantining and eliminating viruses, worms, trojans,
spyware, adware, malware and unauthorized data and software,
on computers, computer networks, and internet enabled
devices in the internet of things (IOT); computer services,
namely, acting as an application service provider in the
field of knowledge management to host computer application
software for creating databases of information and data
related to malware and computer and network security;
computer systems analysis, namely, surveillance and
monitoring of computer hardware, networks, software, and
internet-enabled devices in the internet of things (IoT) to
assess and detect information security, vulnerabilities,
unauthorized access, data breach and focus areas; technical
consulting services in the fields of cybersecurity and
information security
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen