41
Educational services, namely, providing training in the use
of software in the field of data security
42
Software as a service (saas) featuring software in the
fields of data security for secure network access, data and
software security, encryption, and content compliance and
governance; providing temporary use of an online
non-downloadable software application featuring enterprise
test management software that enables companies to create
and manage organizational standards and policies for web
site quality, accessibility, privacy, usability,
searchability and custom quality factors and to verify
compliance with such organizational standards and policies;
providing temporary use of online non-downloadable software
for securing documents, data, and information, protection of
documents, data and information, and encryption of
documents, data and information, and restriction and
tracking of access to documents, data and information;
software as a service (saas) services, namely, hosting
software for use by others for use securing documents, data
and information, protection of documents, data and
information, and encryption of documents, data and
information, and restriction and tracking of access to
documents, data and information; evaluation of computer
systems, namely, analysis of internal computer systems,
extranet computer systems and global computer network
systems, for others; implementing computer software systems
for others; designing, developing, implementing and
monitoring computer networks and computer systems for
others; computer and network monitoring services, namely,
monitoring technological functions of websites and computer
network systems for others, load balancing of servers, and
computer network security services in the nature of
enforcing, restricting and controlling access privileges of
users of computing resources for cloud, mobile or network
resources based on assigned credentials, scanning and
penetration testing of computers and networks to assess
information security vulnerability, restricting access to
and by computer networks to and of undesired web sites,
media and individuals and facilities; providing temporary
use of online, non-downloadable software for accessing and
using a cloud computing network; software as a service
(saas), namely, hosting software applications for others in
the fields of information technology (it) systems and
information security management; application service
provider (asp) services, namely, hosting computer software
applications of others; consulting services in the field of
software as a service (saas); technical consulting services
in the fields of datacenter architecture, public and private
cloud computing solutions, and evaluation and implementation
of internet technology and internet services; providing
temporary use of online, non-downloadable computer software
for compliance management and risk analysis in the fields of
computer and network security; providing temporary use of
online non-downloadable network security software; providing
temporary use of online nondownloadable identity
verification software; providing temporary use of online
nondownloadable network auditing software in the fields of
secure communications and data networks; computer
consultation in the nature of consultation about the
maintenance and updating of computer software and computer
technology consultancy and providing technical consulting
information in the field of internet and network security
and secure transmission of data and information; technical
consulting services in the field of electronic storage and
archiving of data for others; infrastructure as a service
(iaas), namely, providing remotely accessible storage
capacity in the nature of electronic storage of data;
technical support services, namely, remote administration
and management of virtual infrastructure storage; storage
services for archiving of electronic data; providing
information in the field of electronic data storage products
and services via a website; computer security services,
namely, monitoring of computers, websites, computer networks
and communications network systems for security purposes;
computer networks and communications network security
services in the nature of intrusion protection via firewall
software, computer security threat analysis for protecting
data, managed IT system security services in the nature of
computer security consultancy to assess information security
vulnerability; computer security incident response services
in the nature of software as a service services (SaaS)
featuring software for computer security incident mitigation
and resolution, computer forensic services, and penetration
testing of computers and networks to assess information
security vulnerability; providing electronic user
authentication services using software technology for
e-commerce transactions and online software applications to
others in the field of voice and data communication services
via computer networks; computer security services in the
nature of the issuance and validation of digital
certificates and other electronic security credentials in
the nature of electronic access codes for others; identity
as a service (idaas), namely, providing cloud-based computer
network identification verification and authentication
services via software technology for security purposes;
computer security services, namely, secure hosted electronic
storage of passwords, digital credentials and electronic
identity information relating to persons, accounts and
devices for security purposes; providing temporary use of
online, nondownloadable software for fraud prevention and
access authorization for verifying a user's true identity,
both on-line and on-site, in the fields of controlling
access to information, medical records, computer systems,
websites, online services, e-commerce and financial
transactions; consulting services in the field of computer
security and communications network security; providing
information in the fields of internet, network, computer and
data security, as well as online fraud and identity theft
protection via a website; computer security consultancy in
the field of scanning and penetration testing of computers
and networks to assess information security vulnerability;
computer services, namely, providing search engines for
obtaining data and information on a global computer network;
computer services, namely, providing a website featuring a
media aggregator and search engine for internet content;
providing a search engine on the Internet for information;
provision of internet search engines; hosting a website
featuring on-line non-downloadable software that enables
users to scan websites and identify malicious code
injections, providing an assessment of the type and risk
level of malware attacks, theft of credentials, and theft of
other forms of personal data; hosting a website featuring
on-line non-downloadable software that enables users to
obtain malware injection attack visibility by taking a
screenshot of a malware-injected web page, enhancing attack
detection accuracy and assisting in forensic investigations;
providing temporary use of non-downloadable electronic
fraud, identity theft and cyberattack protection and
monitoring software; software as a service (saas) services
featuring software for reporting, policy analytics and data
visualization relating to domain-based message
authentication, reporting, conference, and compliance with
applicable standards for the same; providing temporary use
of non-downloadable electronic fraud and identity theft
protection software; providing online non-downloadable
secure software for providing safe browsing to users in
e-commerce transactions, online financial transactions and
online communications; electronic information security
consulting, namely, penetration testing of computers and
networks to assess information security vulnerability,
analysis of software application code, and computer security
threat analysis of software applications for protecting
data; computer security services for protecting data and
information from unauthorized access, in the nature of
electronic monitoring of computer networks for cyber attack
incidents and providing information regarding such
incidents; online fraud protection services, namely,
electronic monitoring of personally identifying information
and electronic transaction activity to detect fraud and
identity theft via the internet; computer security services
for protecting data and information from unauthorized
access, in the nature of electronic monitoring of credit
reports, Internet traffic and public records to facilitate
the prevention of identity theft and fraud; electronic fraud
protection services, namely, design and implementation of
software and technology solutions for the purpose of
electronic brand monitoring, to protect against
counterfeiting, tampering, and diversion; electronic
identification services, namely, providing user
authentication services using technology for e-commerce
transactions, online financial transactions, and online
communications; providing on-line non-downloadable software
for integrating and allowing for communication between
electronic fraud, identify theft protection, unauthorized
access detection, and policy and decision-making software
systems; software as a service (SAAS) services, namely,
hosting software for use by others for integrating and
allowing for communication between electronic fraud,
identify theft protection, unauthorized access detection,
and policy and decision-making software systems; providing
online, nondownloadable computer software for data
analytics, comprehensive data processing, visual analytics,
machine learning and document production for use in digital
investigations, e-discovery, intelligence mining and
corporate communication compliance; consulting services in
connection with enterprise test management software that
enables companies to create and manage organizational
standards and policies for web site quality, accessibility,
privacy, usability, searchability and custom quality factors
and to verify compliance with such organizational standards
and policies
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen