Goods and Services | Computer hardware and software for secure web browsing for use by the private sector and government operations; computer hardware and software for web isolation, namely, for use in securing endpoints from internet-based security threats; computer hardware and software for web browser isolation, namely, for use in securing endpoints from internet-based security threats; computer hardware and software for internet isolation, namely, for use in securing endpoints from internet-based security threats; computer hardware and software for network isolation, namely, for use in securing endpoints from internet-based security threats; computer hardware and software for remote internet browsing; communication software for providing secure access to the Internet; computer hardware; computer hardware and software for enhancing and improving computer and network security; computer hardware and software for enhancing and improving digital security; computer security products, namely, computer peripherals; computer hardware and software for cross-domain solutions, namely, computer hardware and software for use by high security government operations to interact securely with high-risk and vulnerable computer systems; computer software for preventing security threats on computer systems; computer software and computer hardware for preventing computer viruses, rootkits, advanced persistent threats, malware, and malicious attacks; computer software for preventing malicious attacks on computers, computer systems, and digital devices; computer software and hardware for providing secure virtual computer systems and virtual computer environments; computer hardware and software for enabling secure remote browsing by isolating computer risks and providing users with access to a real-time video feed; computer hardware and embedded computer software for isolating computer network threats; computer hardware and embedded computer software for isolating computer viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer software for providing remote access to the internet; computer software for minimizing security threats, namely, providing a secure internet browsing experience via access to a real-time video feed; computer browsing software, namely, software for browsing the optical and electronic communications networks of the Internet |
Goods and Services | Design and development of computer hardware and software; design of computer hardware and computer software for internet security and access solutions, namely, for remote browsing via web, browser, internet, and network isolation in the nature of securing endpoints from internet-based security threats; developing customized software for others; developing customized software in the field of internet security for others; design and development of electronic data security systems; computer security services, namely, restricting unauthorized access to enterprise computer networks; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; cloud computing featuring software for use in maintaining computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for isolating computer viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; cloud computing services featuring software in the field of computer and network security, namely, software for use in the remote browsing via web, browser, internet, and network isolation in the nature of securing endpoints from internet-based security threats; cloud computing featuring software for secure remote internet browsing; computer services, namely, cloud hosting provider services; computer services, namely, integration of private and public cloud computing environments; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; providing temporary use of non-downloadable computer software for secure web browsing for use by the private sector and government operations; providing temporary use of on-line non-downloadable computer software for web isolation, namely, for use in securing endpoints from internet-based security threats; providing temporary use of non-downloadable computer software for web browser isolation, namely, for use in securing endpoints from internet-based security threats; providing temporary use of non-downloadable computer software for internet isolation, namely, for use in securing endpoints from internet-based security threats; providing temporary use of non-downloadable computer software for network isolation, namely, for use in securing endpoints from internet-based security threats; providing temporary use of non-downloadable computer software for remote internet browsing; providing temporary use of non-downloadable computer software for secure internet access; providing temporary use of non-downloadable computer software for providing and maintaining computer and network security; providing temporary use of non-downloadable computer software for providing and maintaining digital network security; providing temporary use of non-downloadable computer software for cross-domain solutions, namely, computer software for use by high security government operations to interact securely with high-risk and vulnerable computer systems; providing temporary use of non-downloadable computer software for preventing security threats on computer systems; providing temporary use of non-downloadable computer software for preventing computer viruses, rootkits, advanced persistent threats, malware, and malicious attacks; providing temporary use of non-downloadable computer software for preventing malicious attacks on computers, computer systems, and digital devices; providing temporary use of non-downloadable computer software for providing secure virtual computer systems and virtual computer environments; providing temporary use of non-downloadable computer software for enabling secure remote browsing by isolating computer risks and providing users with access to a real-time video feed; providing temporary use of non-downloadable computer software for isolating computer network threats; providing temporary use of non-downloadable computer software for isolating computer viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; providing temporary use of non-downloadable computer software for providing remote access to the internet; providing temporary use of non-downloadable computer software for minimizing security threats, namely, providing a secure internet browsing experience via access to a real-time video feed; providing temporary use of non-downloadable computer software for internet browsing, namely, software for browsing the optical and electronic communications networks of the Internet |