9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
software for analytics for cyber security for the detection of evidence of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat from sources such as the darkweb, deepweb, social media, open internet, and related sources that are used to steal intellectual property from corporations or disrupt operations; software for analyzing and sharing cyber-threat information; software that ingests security threat data and identifies security threats form malicious hacker communities; software for providing risk assessment of organizations based on information on malicious threat actors; all of which are provided to customers via a programming interface and web portal
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
software as a service (saas) services featuring software for analytics and use in cyber security for the detection of evidence of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat from sources such as the darkweb, deepweb, social media, open internet, and related sources that are used to steal intellectual property from corporations or disrupt operations; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices based on aforementioned information; information technology security services in the nature of providing network access to cyber-threat intelligence, intelligence information integration, and risk assessment relating to cybersecurity