9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
cyber security computer software for the purpose of monitoring information technology (it), operational technology (ot) and internet of things (iot) systems, containing namely computer workstations, servers, mobile phones, ip connected devices, industrial control systems, programmable logical controllers (plcs), human machine interfaces (hmi), historian servers and scada servers, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; client and server computer software, namely cyber security software, for monitoring information technology (it), operational technology (ot) and internet of things (iot) devices and networks as well as for storing and analyzing data for the purpose of monitoring, detecting, responding to, and investigating cyber security events, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer software, namely cyber security software, for use in protecting the safety of people, assets, and critical processes and infrastructure from the result of cyber security events, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer software, namely cyber security software, for use in real-time and near real-time alerting of cyber security events detected on information technology (it), operational technology (ot) and internet of things (iot) systems, namely on computer workstations, servers, mobile phones, ip connected devices, industrial control systems, programmable logical controllers (plcs), human machine interfaces (hmi), historian servers and scada servers, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer software, namely cyber security software, for managing cyber security event responses, alert management, response management, cyber security event investigation, cyber security event workflow automation and cyber event data collection and analysis, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer software, namely cyber security software, for use in security operations centers, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
computer and information technology consultancy services namely, cybersecurity consulting for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer consultancy in the field of computer and network security, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer security consultancy in the field of monitoring of computers and networks, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; software as a service (saas) services namely cyber security software in the field of computer and network security, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; software as a service (saas) services namely cyber security software for use in real-time and near real-time monitoring of computer networks, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; software as a service (saas) services, namely, hosting cyber security software for use by utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response, for monitoring, detecting, responding to and investigating cyber security events; technical and information technology consultancy for, security operations centers, threat assessment, and associated support services, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; application service provider (asp) for non-downloadable computer software for use in computer and network security, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; maintenance and updating of computer software for computer and network security and monitoring and detecting of cyber security events, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; cloud computing featuring software for use in computer and network security, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; cloud computing services in the field of computer and network security, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; software as a service (saas) services namely software in the field of computer and network security for use in real-time and near real-time monitoring of cyber security events detected on information technology (it), operational technology (ot) and internet of things (iot) systems, namely computer workstations, servers, mobile phones, ip connected devices, industrial control systems, programmable logical controllers (plcs), human machine interfaces (hmi), historian servers and scada servers, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; software as a service (saas) services namely software in the field of computer and network security for use in real-time and near real-time alerting of cyber security events detected on information technology (it), operational technology (ot) and internet of things (iot) systems, containing computer workstations, servers, mobile phones, ip connected devices, industrial control systems, programmable logical controllers (plcs), human machine interfaces (hmi), historian servers and scada servers, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer security consultancy services namely developing and implementing plans for improving computer and network security and preventing criminal activity for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer security consultancy services for computer hardware and peripheral development, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response; computer security consultancy services for computer hardware and peripheral development for use in real-time and near real-time monitoring of cyber security events detected on information technology (it), operational technology (ot) and internet of things (iot) systems, containing computer workstations, servers, mobile phones, ip connected devices, industrial control systems, programmable logical controllers (plcs), human machine interfaces (hmi), historian servers and scada servers, for utility providers, manufacturers and infrastructure operations management companies, none of the foregoing in the fields of public health, patient care, and emergency response