Filters
on 25 Sep 2024
SOPHOS LIMITED
2126428 · 29 Mar 2021
042
Class 042
Computer & Software Services & Scientific Services
Technical advice relating to operation of computers; technical support services, namely troubleshooting of computer software problems, technical advice in the field of computer and network security; remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; troubleshooting of computer software problems; monitoring technological functions of computer network systems; computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer software consulting services; computer technology consulting services; computer security consultancy services; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption and decryption of digital files; providing on-line, non-downloadable computer compliance software namely, software for use in tracking and managing of compliance with security policies, and monitoring and audit whether business processes are aligned with applicable laws, organizational policies, and the standards of consumers and business partners; providing on line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for managing, monitoring, and securing users' authorizations, security policies, and computer systems, and featuring artificial intelligence analytics for security purposes; software as a service (SAAS) services featuring software for visualizing permissions and configurations of users and configuration of security policies, computer systems, and traffic flow, and featuring artificial intelligence analytics for security purposes; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; software as a service (SAAS) services featuring software for computer network and computer system security; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; remote and on-site services for monitoring, administration and management of public and private cloud computing and application computing systems; computer security consultancy; providing on-line, non downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, and computer systems; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, and computer systems; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, and computer systems; software as a service (SAAS) services featuring software for asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; computer virus protection services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources based on assigned credentials; providing information on data security and computer security; monitoring of computer systems for security purposes.
Technical advice relating to operation of computers; technical support...
Image Search
Drag and drop or upload to search any image