9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
testing apparatus not for medical purposes, namely, computer hardware for testing computers for security threats; computer software, recorded, for protecting it infrastructure from cyber attacks, for protecting ecommerce and web portals from bots, fraud and data leakage, for protecting online banking systems from fraud and cyberattacks, for detecting cyber threats and cyber attacks to computer systems and it infrastructure, for tracking users of computer systems and software; diagnostic apparatus, not for medical purposes for assessing the performance of anti-cyber attack prevention software and hardware; teaching apparatus, namely, cyber attacks training simulators; computer software applications, downloadable, for protecting it infrastructure from cyber attacks, for protecting ecommerce and web portals from bots, fraud and data leakage, for protecting online banking systems from fraud and cyberattacks, for detecting cyber threats and cyber attacks to computer systems and it infrastructure, for tracking users of computer systems and software; computer programs, recorded, for protecting it infrastructure from cyber attacks, for protecting ecommerce and web portals from bots, fraud and data leakage, for protecting online banking systems from fraud and cyberattacks, for detecting cyber threats and cyber attacks to computer systems and it infrastructure, for tracking users of computer systems and software; computer game software, downloadable; downloadable computer programs, for protecting it infrastructure from cyber attacks, for protecting ecommerce and web portals from bots, fraud and data leakage, for protecting online banking systems from fraud and cyberattacks, for detecting cyber threats and cyber attacks to computer systems and it infrastructure, for tracking users of computer systems and software; computer programs, downloadable, for protecting it infrastructure from cyber attacks, for protecting ecommerce and web portals from bots, fraud and data leakage, for protecting online banking systems from fraud and cyberattacks, for detecting cyber threats and cyber attacks to computer systems and it infrastructure, for tracking users of computer systems and software; computer operating programs, recorded; data processing apparatus, all the aforementioned goods being limited to the detection of cyberattacks and online fraud, namely, money laundering, identity theft, payment fraud, pc and mobile malware, social engineering attacks and cross channel/client attacks
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
computer system analysis; recovery of computer data; installation of computer software; research and development of new products for others; information technology (it) consultancy; computer software consultancy; updating of computer software; monitoring of computer systems by remote access; software as a service (saas) featuring software for protecting it infrastructure from cyber attacks, for protecting ecommerce and web portals from bots, fraud and data leakage, for protecting online banking systems from fraud and cyberattacks, for detecting cyber threats and cyber attacks to computer systems and it infrastructure, for tracking users of computer systems and software; maintenance of computer software; providing information on computer technology and programming via a web site; computer system design; rental of computer software; duplication of computer programs; computer software design; computer programming; consulting services in the field of cloud computing; outsource service providers in the field of information technology; off-site data backup; computer technology consultancy in the field of computers and information security; telecommunications technology consultancy; scientific laboratory services, all the aforementioned services being limited to the detection of cyberattacks and online fraud, namely, money laundering, identity theft, payment fraud, pc and mobile malware, social engineering attacks and cross channel/client attacks