9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
computer software to implement a standard architecture as a platform for integration of security operations and network access control; computer software for network access control; computer software for network security, system security, file security, user security, and data security; computer software for management and monitoring of computer networks, systems, files, users, and data; computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, users, and data; computer software for managing and optimizing hardware and software in an information technology environment; computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, users, and mobile devices; computer software for policy monitoring, management, orchestration, action, response, and adherence for protecting against cyber-attacks and threats; computer software for identity management information security; computer software for maintaining access control and identity management for protecting against cyber-attacks and threats; computer software for maintaining appropriate risk, audit and compliance posture for protecting against cyber-attacks and threats; computer software for implementing zero-trust networks and managing boundaries for network users, systems, and processes for protecting against cyber-attacks and threats