Goods and Services | Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith; |
Goods and Services | Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen; |
Goods and Services | Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; |