9 Application software for smartphones, namely, downloadable computer security antivirus, anti-spyware, anti-malware, anti-ransomware, malicious code screening, malicious content screening, and data loss prevention (DLP) software apps; Application software for smartphones, namely, downloadable computer security software apps to block access to malicious and phishing websites and malicious mobile applications; computer hardware; computer hardware for integrated control of security functions to protect computer network against threat by computer virus, illegal access and others; computer software, namely, downloadable computer security antivirus, anti-spyware, anti-spam, anti-fraud, anti-malware, anti-ransomware, firewall, malicious code screening, malicious content screening, data loss prevention (DLP), and data encryption software; computer software, namely, downloadable computer software for detecting and reporting malware, trojans, worms, spyware, and ransomware; computer software, namely, downloadable computer software for securing, monitoring and protecting data, computers, mobile devices, computer and communication networks, and network endpoints; downloadable computer software for detecting, analyzing, reporting and sharing computer, data and network security threats; computer software, namely, downloadable computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; computer software, namely, downloadable computer software for URL filtering, namely, blocking internet and web content; computer software, namely, downloadable computer software for application control, namely, recognizing safelisted files and safelisted applications, blocking blocklisted files and blocklisted applications, and blocking applications based on categories; computer software, namely, downloadable computer software for endpoint detection and response, namely, gathering, correlating, and identifying suspicious objects within data or telemetry; computer software, namely, downloadable computer software for protecting users from malicious or problematic websites based on reputation; computer utility software; computer software for firewall; computer software for data security of computers and other computer software; computer software to prevent confidential information from leaking; computer software and electronic publications to provide information to users and to educate users in relation to computer and network security; computer software to monitor, report and perform the regulated compliance; computer software to backup and to restore data; computer hardware and software to protect and to enhance confidentiality of data; computer hardware and software to protect or to restore the perfect condition of data, computer, computer software, computer network; computer hardware and software to protect or to restore the effectiveness of data and the infrastructure of computers; other electronic publications, namely, downloadable user manuals, administration guides, and quick start instruction; downloadable image files via Internet, namely, disk image files