Goods and Services | downloadable utility, security and cryptography software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; downloadable utility, security and cryptography software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; downloadable software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; downloadable software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts for network and device security; downloadable software development tools; downloadable security software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; downloadable security software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; network access server hardware; downloadable mobile applications for the management of information; downloadable internet access software; downloadable computer software for the management of information; downloadable computer software for biometric systems for the identification and authentication of persons |
Goods and Services | Updating of computer software relating to computer security and prevention of computer risks; software development, programming and implementation; software design and development; rental of internet security programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of security services for computer networks, computer access and computerized transactions, namely, providing temporary use of on-line, non-downloadable software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; provision of security services for computer networks, computer access and computerized transactions, namely, providing temporary use of on-line, non-downloadable software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of computer security risk management programs, namely, providing temporary use of on-line, non-downloadable computer programs for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; provision of computer security risk management programs, namely, providing temporary use of on-line, non-downloadable computer programs for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of information technology, namely, providing information in the field of computer software design and development and cybersecurity; IT security, protection and restoration, namely, providing temporary use of on-line, non-downloadable computer software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; IT security, protection and restoration, namely, providing temporary use of on-line, non-downloadable computer software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of computer software design; programming of internet security programs; monitoring of computer systems for detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; monitoring of computer systems for verifying authorized system user identity for identity security, detection of cyber threats in the nature of unauthorized user access, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; maintenance of computer software relating to computer security and prevention of computer risks; IT consultancy, advisory and information services, namely, providing consultancy, advisory and information in the field of computer software design and development relating to cyber security; internet security consultancy; digital asset management, namely, electronic data storage; electronic monitoring of personally identifying information to detect identity theft via the internet; development of software for secure network operations; design and development of virtual private network (VPN) operating software; development of computer hardware and software; design and development of internet security programs; design and development of electronic data security systems; data security consultancy services; IT security consultancy services being data security consultancy for analysing information systems; consultancy in the field of security software; consultancy in the field of data security; consultancy and information services relating to information technology architecture and infrastructure; consultancy in the field of computer data security; consultancy and information services relating to computer system integration; computer security threat analysis for protecting data; computer security services in the nature of administering digital certificates; computer programming services for electronic data security; computer software and information technology in the nature of IT being data security consultancy services; authentication services for computer security, namely, computer software consultancy and software management being design, development, install, and maintenance of computer software in relation to identity security and identity and access management; advisory services relating to computer based information systems, namely, IT security consultancy being software consultancy in the field of data security |