Goods and Services | Downloadable computer software for managing, deploying, securing, and monitoring endpoint devices within enterprise environments; downloadable computer software for automated device configuration, compliance enforcement, and integration with IT management systems; downloadable computer software for managing security policies, remote device access, and data protection across multiple operating systems; downloadable computer software for real-time threat detection, risk assessment, and incident response for endpoint devices; downloadable computer software for remote control, maintenance, and updates of enterprise devices; downloadable computer software featuring integration with third-party applications for automated device configuration, compliance enforcement, security policy management, and remote access control; recorded computer software for managing, deploying, securing, and monitoring endpoint devices within enterprise environments; recorded computer software for automated device configuration, compliance enforcement, and integration with IT management systems; recorded computer software for managing security policies, remote device access, and data protection across multiple operating systems; recorded computer software for real-time threat detection, risk assessment, and incident response for endpoint devices; recorded computer software for remote control, maintenance, and updates of enterprise devices; recorded computer software featuring integration with third-party applications for automated device configuration, compliance enforcement, security policy management, and remote access control; Computer software downloaded from the internet for managing, deploying, securing, and monitoring endpoint devices within enterprise environments; computer software downloaded from the internet for automated device configuration, compliance enforcement, and integration with IT management systems; computer software downloaded from the internet for managing security policies, remote device access, and data protection across multiple operating systems; computer software downloaded from the internet for real-time threat detection, risk assessment, and incident response for endpoint devices; computer software downloaded from the internet for remote control, maintenance, and updates of enterprise devices; computer software downloaded from the internet featuring integration with third-party applications for automated device configuration, compliance enforcement, security policy management, and remote access control; downloadable computer software adapted for use in the operation of computers; Downloadable computer software applications (apps) for mobile phones, portable media player and handheld computers, namely, software for managing, deploying, securing, and monitoring endpoint devices within enterprise environments; Downloadable computer software applications (apps) for mobile phones, portable media player and handheld computers, namely, software for automated device configuration, compliance enforcement, and integration with IT management systems; Downloadable computer software applications (apps) for mobile phones, portable media player and handheld computers, namely, software for managing security policies, remote device access, and data protection across multiple operating systems; Downloadable computer software applications (apps) for mobile phones, portable media player and handheld computers, namely, software for real-time threat detection, risk assessment, and incident response for endpoint devices; Downloadable computer software applications (apps) for mobile phones, portable media player and handheld computers, namely, software for remote control, maintenance, and updates of enterprise devices; Downloadable computer software applications (apps) for mobile phones, portable media player and handheld computers, namely, software for featuring integration with third-party applications for automated device configuration, compliance enforcement, security policy management, and remote access control; downloadable network management computer software; downloadable computer programs for analysing computer hardware; downloadable computer programs for testing computer hardware; Computer hardware; electronic security devices for computer hardware, namely, electronic security tags and labels, acoustic tags, magnetic tags; downloadable computer anti-virus security software; downloadable computer anti-virus software; computer networking hardware; downloadable computer software to maintain and operate computer systems |
Goods and Services | Computer software advisory services; computer software consultancy; computer software design; computer software development; information technology (IT) consultancy services relating to computer hardware, software and peripherals design; providing temporary use of web-based software for managing, deploying, securing, and monitoring endpoint devices within enterprise environments; providing temporary use of web-based software for automated device configuration, compliance enforcement, and integration with IT management systems; providing temporary use of web-based software for managing security policies, remote device access, and data protection across multiple operating systems; providing temporary use of web-based software for real-time threat detection, risk assessment, and incident response for endpoint devices; providing temporary use of web-based software for remote control, maintenance, and updates of enterprise devices; providing temporary use of web-based software featuring integration with third-party applications for automated device configuration, compliance enforcement, security policy management, and remote access control; Application service provider (ASP) featuring online non-downloadable software for managing, deploying, securing, and monitoring endpoint devices within enterprise environments; Application service provider (ASP) featuring online non-downloadable software for automated device configuration, compliance enforcement, and integration with IT management systems; Application service provider (ASP) featuring online non-downloadable software for managing security policies, remote device access, and data protection across multiple operating systems; Application service provider (ASP) featuring online non-downloadable software for real-time threat detection, risk assessment, and incident response for endpoint devices; Application service provider (ASP) featuring online non-downloadable software for remote control, maintenance, and updates of enterprise devices; Application service provider (ASP) featuring online non-downloadable software featuring integration with third-party applications for automated device configuration, compliance enforcement, security policy management, and remote access control;; software as a service (SaaS) featuring software for managing, deploying, securing, and monitoring endpoint devices within enterprise environments; software as a service (SaaS) featuring software for automated device configuration, compliance enforcement, and integration with IT management systems; software as a service (SaaS) featuring software for managing security policies, remote device access, and data protection across multiple operating systems; software as a service (SaaS) featuring software for real-time threat detection, risk assessment, and incident response for endpoint devices; software as a service (SaaS) featuring software for remote control, maintenance, and updates of enterprise devices; software as a service (SaaS) featuring integration with third-party applications for automated device configuration, compliance enforcement, security policy management, and remote access control;; consultancy in the design and development of computer hardware; computer security services being design and development of secure computer hardware, software and systems; computer security services being computer programming and installation, maintenance and repair of computer software; computer virus protection services; computer security services being testing of computer networks to assess risk; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer security consultancy; data security consultancy; data security services being design and development of electronic data security systems, namely, firewalls; internet security consultancy; computer security services, namely, restricting unauthorized access to hard drives, computer networks and websites by means of personal identification; advisory services relating to computer software support and information; advisory and consultancy services relating to computer hardware design; research relating to development of computer security software; computer security threat analysis for protecting data, namely, assessing information technology security of computer networks |