Computer security software for ensuring the security of electronic mail, and for restricting unauthorized access to hard drives, computer networks and websites; Software for monitoring, analyzing, controlling, recording, detecting and filtering transfers of information and data to and from external media, via and on the internet, information networks, workstations, computers as well as access to information, data, sites, servers; Software for auditing, protecting and securing information, data, networks, computer systems, computers, servers and workstations; Computer software for use in ensuring the security of electronic mail for fraud protection purposes; Computer software for monitoring computers for security purposes; Downloadable electronic publications in the nature of instruction manuals and instructional data sheets for use with computer software
Computer security software for ensuring the security of electronic mail, and for restricting unauthorized access to hard drives, computer networks and websites; Software for monitoring, analyzing, controlling, recording, detecting and filtering transfers of information and data to and from external media, via and on the internet, information networks, workstations, computers as well as access to information, data, sites, servers; Software for auditing, protecting and securing information, data, networks, computer systems, computers, servers and workstations; Computer software for use in ensuring the security of electronic mail for fraud protection purposes; Computer software for monitoring computers for security purposes; Downloadable electronic publications in the nature of instruction manuals and instructional data sheets for use with computer software