09
Computer application software for electronic devices, mobile
phones, and handheld computers, namely, software for
aggregating, storing, managing, editing, backing up,
securing, protecting and managing data and computer,
electronic device, and cloud application content;
downloadable computer software for aggregating, storing,
managing, editing, backing up, securing, protecting and
managing data and computer, electronic device and cloud
application content; downloadable computer software for
encryption; downloadable computer software for litigation
hold and electronic discovery; downloadable computer
software for monitoring properties of files; downloadable
computer software for analyzing file properties and
determining if file properties have changed; downloadable
computer software for creating reports regarding properties
of files and changes in the properties of files;
downloadable computer software for identifying when files
have been moved to removable media or cloud applications;
downloadable computer software for creating audit trails
relating to file properties; downloadable computer software
for generating reports regarding ownership history of files,
movement history of files, and content history of files;
downloadable computer software for tracking and identifying
unusual activity relating digital content and files;
downloadable computer software for analyzing file properties
and generating file property reports; downloadable computer
software for tracking, identifying, searching, and reporting
on file activity data; downloadable computer software for
tracking activity across computers, email and the cloud;
downloadable software for use in connection with data
security, computer security, cybersecurity, software
threats, and prevention of computer risks
41
Educational services, namely, conducting courses, workshops,
trainings and seminars in the fields of technology, computer
software, computer systems, computer facilities and
networks, data storage, data security, computer security,
and information security and distribution of course and
educational materials in connection therewith; publication
of on-line diaries (blogs) on the Internet and providing
non-downloadable publications in the nature of articles in
the fields of technology, computer software, computer
systems, computer facilities and networks, data storage,
data security, computer security, and information security
via a website; training services in the fields of
information risk management and computer data security
42
File protection services, namely, back-up services for
computer hard drive and cloud data; data warehousing; remote
computer backup services; remote online backup of computer
and cloud data; software as a service (saas) services
featuring software for aggregating, storing, managing,
editing, backing up, securing, protecting and managing data
and computer, electronic device and cloud application
content; providing temporary use of non-downloadable
cloud-based software for monitoring files and properties of
files; providing temporary use of non-downloadable
cloud-based software for analyzing file properties and
determining if file properties have changed; providing
temporary use of non-downloadable cloud-based software for
creating reports regarding properties of files and changes
in the properties of files; data encryption services, data
encryption and decoding services; computer services, namely,
encrypted data recovery and data security services;
providing temporary use of non-downloadable computer
software for litigation hold and electronic discovery;
cross-platform conversion of digital content into other
forms of digital content; providing temporary use of
non-downloadable computer software for identifying when
files have been moved to removable media or cloud-based
applications or storage; providing temporary use of
non-downloadable computer software for creating audit trails
relating to file properties; providing temporary use of
non-downloadable computer software for generating reports
regarding ownership history of files, movement history of
files, and content history of files; providing temporary use
of non-downloadable computer software for tracking and
identifying unusual activity relating digital content and
files; providing temporary use of non-downloadable computer
software for analyzing file properties and generating file
property reports; providing temporary use of
non-downloadable computer software for tracking,
identifying, searching, and reporting on file activity data;
software as a service (saas) services featuring software for
data security and for assistance and support in the
prevention of unauthorized network data exfiltration on
computers, computer systems, computer networks and digital
devices; software as a service (saas) services featuring
software for computer system, corporate cloud and email risk
detection; technical consulting services in the fields of
datacenter architecture, public and private cloud computing
solutions, and evaluation and implementation of internet
technology and services; consulting services in the fields
of information risk management and computer data security;
technical consulting services related to designing,
developing, customizing, configuring, deploying, analyzing,
and managing of data security systems for others; computer
security consultancy in the field of insider threat
management, in the nature of insider risk monitoring and
reduction; computer security consultancy in the nature of
advanced cybersecurity services featuring the application
and implementation of techniques, tools and expertise to
detect, investigate and remediate advanced persistent
threats and insider threats and include offensive cyber
capabilities
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen