9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems; downloadable privileged access management computer software for use in controlling, monitoring and managing user access to computer systems and software, computer software for managing and securing passwords and sensitive information; computer software for managing software encryption keys; computer software for managing digital public key identity certificates that allow secure exchange of data over the internet; software for blocking detected phishing sites in email links and web browsing; downloadable computer software for use in initiating, monitoring and recording privileged sessions between users and computer hardware and software systems, initiating privileged sessions between users and computer hardware and software systems without revealing passwords to the end user, and recording usage of administrative and privileged accounts and activities performed by users during privileged sessions and including a playback feature of such recordings
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
non-downloadable security software, namely, anti-malware, anti-phishing, and anti-hacking software, non-downloadable security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; non-downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; non-downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; non-downloadable training simulation software in the field of analyzing, detecting and preventing digital and online threats consisting of computer virus, malware and phishing attacks