9 Data processing equipment; computer systems, namely, computers, software programs for use in information security, data security, log management, session management, account analytics and hardware programs, computer peripherals, and computer operating systems; computer software platforms for monitoring computer security risks; computer hardware; software and hardware components for control and monitoring data and persons, namely, computer hardware and software, for use in collecting, normalizing, standardizing and parsing data, for processing, transmitting and displaying data, recording, analyzing, indexing, replaying data; computer hardware and software for log management systems; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for data collection, data storage, data analysis and monitoring; recorded or downloadable computer software, computer programs, computer operating programs and computer software applications, all for collecting, processing and storing log messages; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for controlling access to remote IT systems, also for recording activities in searchable, movie-like audit trails; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for use in identifying, preventing and curing malicious actions; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for sharing and storing sensitive information over a company network and over the internet; recorded or downloadable computer software, computer programs, computer operating programs, and computer software applications, all for managing and securing sensitive information; downloadable image files containing computer programs for information security, data security, log management, session management, account analytics; downloadable electronic publications, namely, books, newsletters, articles, brochures, annuals in the field of computers and IT security; all the aforesaid goods related to IT security