Description
[Class : 9] Recorded And Downloadable Media; Computer Software; Downloadable Software In The Nature Of A Mobile Application For Wireless Devices; Downloadable Electronic Publications; Recordable Instruments; Electronic Goods; Cd’s; Dvd’s; Radio; Tv; Photographic; Cinematographic Equipment, Computer Programs; Downloadable Computer Software Applications; Mobile Applications; Downloadable Music Files, Downloadable Image Files; Downloadable Ring Tones; Downloadable Graphics; Downloadable Electronic Publications; Electronic Book Readers. Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Magnetic Data Carriers Recording Discs; Data Processing Equipment And Computers, Scientific, Nautical, Surveying, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision), Lifesaving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling Electricity; Computer Software, Hardware; Scientific, Surveying, Photographic, Cinematographic, Signalling, Checking (Supervision), Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Magnetic Data Carriers, Recording Discs; Compact Discs, Dv Ds And Other Digital Recording Media; Data Processing Equipment, Computers; Mobile Apps, Computer Programs, Computer Software; Downloadable Software In The Nature Of A Mobile Application For Wireless Devices; Downloadable Files, Magnetic Data Carriers Data Processing Equipment And Computers, Downloadable Computer Software For Analysing And Securing Computer Networks; Downloadable Mobile Applications For Searching The Internet For Possible Disclosure Of Personal Or Private Information And Alerting Users To Potential Breaches; Downloadable Software In The Nature Of A Mobile Application For Monitoring Threats, Identifying Data And Converting It Into Intelligence, Correlating The Identified Intelligence, Conducting Investigations Using Identified Intelligence, Identifying And Understanding Vulnerabilities, Gauging Third Party Software Risks, And Monitoring For Fraudulent Behaviour, All On Computer Networks In The Field Of Cybersecurity; Downloadable Computer Software For Managing Computer Network Security, Monitoring For And Predicting Computer Network Threats; Downloadable Computer Software Using Artificial Intelligence (Ai) For Cybersecurity, Specifically Providing Cloud Security Posture Management (Cspm) And Cloud Infrastructure Entitlement Management (Ciem) For Multi Cloud And Hybrid Cloud Environments; Providing Temporary Use Of Non Downloadable Computer Software For The Purpose Of Safeguarding Cloud Infrastructure And Digital Assets.; Downloadable Computer Software Using Artificial Intelligence (Ai) For Identifying And Remediating Security Misconfigurations In Live Cloud Environments, Monitoring And Enforcing Compliance With Regulatory, Legal, And Industry Standards, Generating Audit Ready Reports, Providing Centralized Visibility And Monitoring Of Cloud Assets And System Security Settings, And Analysing And Securing Human And Machine User And Service Identities And Access Permissions To Enforce Principles Of Least Privilege And Detect Risky Entitlements; Downloadable Computer Software Using Artificial Intelligence (Ai) For Cloud Security Posture Management (Cspm), Cloud Workload Protection (Cwpp), Cloud Infrastructure Entitlement Management (Ciem), Data Security Posture Management (Dspm), Infrastructure Ascode (Ia C) Security, And Api Security For Multi Cloud, Hybrid Cloud, And Private Cloud Environments; Downloadable Mobile Applications For Third Party And Vendor Risk Management; Downloadable Mobile Applications For Onboarding, Classifying, Assessing, Monitoring, And Managing Third Party Vendors, Suppliers, And Service Providers; Downloadable Mobile Applications For Collecting, Reviewing, And Evaluating Evidence Of Security And Compliance Controls, Generating Risk Scores And Analytics, And Producing Reports And Dashboards; Downloadable Mobile Applications For Workflow Automation Including Managing Vendor Communications, Document Exchanges, Tasks, And Audit Trails; Downloadable Mobile Applications For Automated Assessment Scoring, Risk Modelling, And Continuous Monitoring Of Third Party Risk Indicators Using Artificial Intelligence (Ai); Online Digital Material For Promotion, Information Through Website, Digital Platforms, Mobile Applications; Downloadable Magazines In The Field Of Technology And Cybersecurity, Cybersecurity Funding, Cybersecurity Business News, Analysis, Regulation, Compliance, And Cybersecurity News Reports; Downloadable Mobile Applications Software In The Field Of Technology And Cybersecurity, Cybersecurity Funding, Cybersecurity Business News, Analysis, Regulation, Compliance, And Cybersecurity News Reports; Downloadable Mobile Applications For Searching The Internet For Possible Disclosure Of Personal Or Private Information And Alerting Users To Potential Breaches; Organization, Arranging And Conducting Of Conferences, Congresses, Seminars, Workshops, And Symposiums; Arranging And Conducting Of Colloquiums In The Field Of Technology And Cybersecurity, Cybersecurity Funding, Cybersecurity Business News, Analysis, Regulation, Compliance, And Cybersecurity News Reports