Filters
Sophos Limited
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Downloadable software for IT infrastructure and cybersecurity automation; downloadable electronic publications, articles, and documents in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; downloadable electronic data files featuring documentation, operational data, alerts, and news updates in the field of data security and security of endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; downloadable computer software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; downloadable computer software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer hardware; wireless access points; computer software, computer programs, and downloadable mobile applications for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer software, computer programs, and downloadable mobile applications for enforcing data policies; computer anti-virus software; computer anti-malware software; computer anti-spam software; computer anti-adware software; computer anti-spyware software; computer software for encryption; downloadable computer data-security programs; computer software for use in threat-reduction scanning of data, emails, electronic files, instant messages, web sites, software, programs, computer systems, and endpoints; computer compliance software; computer software for use in Internet content filtering, secure Internet content management, Internet content checking, and data content checking; mouse pads, webcam covers, USB hardware, mobile phone battery chargers, mobile phone cases; parts, fittings and accessories for all of the aforesaid goods. .
042
Class 042
Computer & Software Services & Scientific Services
Software as a service (SAAS) services featuring software for IT infrastructure and cybersecurity automation; technology consultation in the field of cybersecurity; outsource service providers in the field of information technology; technical advice relating to operation of computers; technical support services; 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; troubleshooting of computer software problems; monitoring technological functions of computer network systems; computer programming services for the protection of software; data security services; computer software technical support services; installation, maintenance and repair of computer software; computer security consultancy; computer software consulting services; computer technology consulting services; computer security consultancy services; consultancy in the design and development of computer hardware; computer software, hardware, firmware, network, and computer security consulting services; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable computer compliance software; providing on-line, non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; software as a service (SAAS) services featuring software for securing users, and security policies; software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; software as a service (SAAS) services featuring software for computer network and computer system security; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer development services; computer programming services; computer virus protection services; computer security services by way of notification of unauthorized electronic messages and related computer attacks; computer security services; computer security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; providing information on data security, and computer security; troubleshooting of computer software problems; technical advice related to computer and computer network security; monitoring of computer systems for security purposes; 24/7 monitoring of servers and web and database applications and notification of related events and alerts; remote and on-site services for monitoring, administration and management of public and private cloud computing and application computing systems; information, consultancy and advisory services relating to the aforesaid. .
Software as a service (SAAS) services featuring software for IT infras...
Image Search
Drag and drop or upload to search any image
End of search results
Page 1 of 1