Publication Registration: |
Wednesday, October 19, 2022 |
Goods and Services Information
|
Description:
|
(1) - Computer software for providing network, Internet, and computer security; computer software for monitoring computer access information; computer software for data traffic and data traffic anomaly analysis; computer software for security intrusion and security threat detection and response; downloadable computer software for backing up, securing, analyzing and restoring computer and network data; computer software for database management; computer database software for use in computer security applications; computer hardware featuring computer software for providing network, internet, and computer security.
(2) - Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Maintenance of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for analyzing computer access information for preventing security threats.
(3) - Computer software for providing network, Internet, and computer security; computer software for monitoring computer access information; computer software for data traffic and data traffic anomaly analysis; computer software for security intrusion and security threat detection and response; downloadable computer software for backing up, securing, analyzing and restoring computer and network data; computer software for database management; computer database software for use in computer security applications; computer hardware featuring computer software for providing network, internet, and computer security.
(4) - Computer software for providing network, Internet, and computer security; computer software for monitoring computer access information; computer software for network data traffic and network data traffic anomaly analysis; computer software for security intrusion and security threat detection and response; downloadable computer software for backing up, securing, analyzing and restoring computer and network data; computer software for database management; computer database software for use in computer security applications for the prevention of computer risks associated with computer databases; computer hardware featuring computer software for providing network, internet, and computer security.
(5) - Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Maintenance of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for analyzing computer access information for preventing security threats.
|