9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
security software, programs and applications, namely, software for use for predicting, discovering, identifying and managing computer network security threats within an organisation; security analytics software, programs and applications, namely, software for use by security analysists to facilitate the search and analysis of data related to cyber threats within an organisation; electronic documentation and manuals sold in conjunction with the aforementioned goods; all of the aforementioned goods relating to data security, security analytics and threat management operations within an organisation
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
computer services, namely, design, programming, development, implementation, hosting, optimisation, performance management, updating, repair, installation, maintenance and configuration of computer software, programs and applications for security analytics and threat management operations within an organisation; online provision of web-based software, namely, the provision of a cloud-based platform that collects, correlates, monitors and mines behavioural data activity logs produced by inter-connected network elements, such as firewalls, routers, intrusion detection tools and other security devices, in order to evaluate and report on patterns and behaviour consistent with a potential cyberattack; monitoring and surveillance of computer networks and systems and their users for the purposes of providing security analytics and directing threat management operations within an organisation; all of the aforementioned services relating to data security, security analytics and threat management operations within an organisation