Goods and Services | Software as a service (SAAS) services featuring software for securing computers, securing data, and securing computer networks; provision of software as a service (SAAS) services featuring software for securing computers, securing data, and securing network security; provision of software as a service (SAAS) for managed detection, response and support for computer, data, network, and network security threats, incidents, and vulnerabilities; providing on-line non-downloadable security software for use in securing computers, securing computer networks, securing data, and securing devices connected to a network; providing on-line non-downloadable computer antivirus software; providing on-line non-downloadable software for monitoring, filtering and reporting of messages, files, programs, and data that were retrieved and received from computer and computer network; providing temporary use of non-downloadable software for securing data of computers and electronic devices; providing on-line non-downloadable software for searching and reporting vulnerability of security of website; providing online non-downloadable computer software for filtering e-mails; provision of Internet search engines; updating of computer software for others via computer and communication networks; technical advice relating to design of computer hardware, computer systems, computer software, computers and communication networks; installing computer programs and advice and consultancy for installing computer programs; providing on-line non-downloadable software for retrieving computer data on computer and electronic devices destroyed or partially destroyed by computer virus; providing on-line non-downloadable software for computer data security; providing on-line non-downloadable software for use in securing email, securing instant messages, and securing website and other network communications; providing on-line non-downloadable software for limiting access to protect data; providing on-line non-downloadable software for backup and restoration of data; providing on-line non-downloadable software to protect and to enhance confidentiality of data; computer programming for others; providing information relating to computer technology via a website in the field of computer viruses and their varieties, in the field of special characteristics of computer viruses, in the field of tendencies of computer viruses, in the field of examples of invasion and infections of computer viruses, in the field of computer virus removal methods, in the field of computer virus preventative steps, and in the field of methods for dealing with computer viruses; providing online non-downloadable computer programs for retrieving and displaying data relating to computer viruses and their varieties, special characteristics, tendencies, examples of invasion and infections, removal methods, preventative steps, and methods for dealing with viruses; provision of vaccine software for computer virus in the nature of providing temporary use of non-downloadable computer anti-virus software; recovery of computer data destroyed or partially destroyed by computer viruses; provision of information via a website relating to restoration of computer data destroyed or partially destroyed by computer viruses; providing advice in the field of recovery of computer programs; research and analysis in the field of computer viruses; providing information relating to research and analysis of computer viruses via a website; providing advice in the field of research and analysis of computer viruses; updating of computer software, namely, pattern files for detecting computer viruses; updating of computer software; monitoring of computer servers for detection, isolation and removal of computer viruses and providing information relating thereto; design, development, and maintenance of computer software; computer technology consultancy provided in the field of design, creation, maintenance of computer program; providing information in the field of computer software design, computer software development, and maintenance of computer software programs; computer technology consultancy being design, creation, and maintenance of information processing systems for use with computers; computer technology consultancy provided in the field of design, creation, and maintenance of information processing systems for use with computers; providing information in the field of computer software design, creation, and maintenance of information processing systems for use with computers; providing information in the field of computer technology consultancy relating to computer bug detection and removal, and computer network updating; computer technology consultancy being information processing by computer; computer technology consultancy being testing and research on computer programs; computer services, namely, testing of computer hardware; computer services, namely, technological research in the field of computer hardware; providing information in the field of computer technology via website; providing information relating to computer technology via a website; computer technology consultancy being consultancy and information services; providing information in the field of computer technology about computer software via website; providing information in the field of computer technology about computer software; computer security consultancy; updating of computer software in the fields of computer security and prevention of computer risks; cybersecurity services in the nature of restricting unauthorized access to computer systems for securing computers, data, and computer networks; technology consultation in the field of cybersecurity services for securing computer, data and computer networks; computer security services in the nature of computer security consultancy for securing computers, data, and computer networks; computer security services in the nature of computer network security consultancy for securing computers, data, and computer networks; computer security services in the nature of internet security consultancy for securing computers, data, and computer networks; computer security services in the nature of data security consultancy for securing computers, data, and computer networks; computer security services in the nature of testing of security systems for securing computers, data, and computer networks; technology consultation in the field of cybersecurity being detection and response services for cybersecurity incidents; computer technology consulting services in the field of cybersecurity Incident Response services; computer technology consulting services in the field of cybersecurity Incident Response services being identifying, responding to, managing and mitigating cybersecurity incidents, threats or attacks; consulting services in the field of cloud-based security software; computer technology consultancy in the fields of computer security software and computer network design, operation and management; technical support services, namely, troubleshooting of computer software problems; technical support services, namely, remediation of computer software problems in the field of cybersecurity incidents, threats or attacks; technical support services, namely, troubleshooting of computer software problems; computer technology consultancy in the fields of custom configuration of computer software and computer networks; computer technology consultancy in the fields of remote administration and management of computer software applications and networks; computer services, computer software services and computer network services, namely, computer technology consultancy in the fields of monitoring, identifying, detecting, investigating, analyzing and reporting threats, breaches, and problems in computer software, computer hardware, computer networks, and computer network hardware that connects to and exchanges information with a computer network; computer services, computer software services and computer network services, namely, computer technology consultancy in the fields of preventing, containing, isolating, responding to, remediating and repairing damage from threats, breaches and problems in computer software and computer networks; |