9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
computer hardware; computer hardware, namely, firewalls and networks security devices; computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; computer software for providing security and protection of data, networks and communications; downloadable computer software for providing security and protection of data, networks and communications; computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; computer software, namely, network security software applications for controlling and managing access server applications; computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; computer security and information technology products, namely, computer software for authorizing access to databases
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
computer security consultancy; computer technology consultancy; providing temporary use of non downloadable computer software services, namely, web security and protection services, detection of suspicious or malicious user activity, unauthorized access or data breach, and cyber-related threats, monitoring of computer systems; computer security services, namely, restricting unauthorized network access by concealing or reshaping the interfaces of a website; providing a secure electronic online system featuring technology of areal time proactive defense mechanisms for vulnerable systems; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems by remote access to ensure proper functioning; cloud computing services featuring software and databases for use in database management for computer security and prevention and mitigation of computer risks; installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; provision of information in the field of computer security risk and internet security risk consultancy; computer and internet security testing services, namely, threat analysis for protecting data and risk control services in the field of internet security for prevention and mitigation of computer risks; design and development of computer hardware and software for use in computer network security and protection; technological consultation in the field of computer networking and network security; technical support, namely, monitoring of network systems and servers related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical consulting related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support services, namely, 24/7 monitoring application services related to the design, development and management of cyber-security systems for others; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing it and application systems; software development in the field of network security, incident and fraud prevention and response, digital forensics, intrusion prevention; maintenance of computer software; software as a service (saas) services featuring software for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting software for use by others for providing security and protection for use in computer network security; software as a service (saas) services, namely, hosting cloud and datacenter infrastructure software for use by others for providing security and protection in relation to security and protection computer software