9
Computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software programs and downloadable software for security, encryption, digital signatures, authentication, fraud detection, interception, and jamming across operating environments, multiple platforms and net protocols, websites and mobile devices; electronic optical data encryption units; electronic text message encryption units for wireless phones and pocket PCs; electronic encryption units; external computer hard drives featuring software for data encryption; electronic transmitters for jamming signals; computer software for jamming solutions; computer hardware, filters and components in the nature of signal processors for use in processing incoming telecommunications signal data in order to detect, identify, isolate and eliminate jamming signals and interference; integration of optical systems and computer hardware for network performance monitoring, network security, cyber security, and lawful interception; software for the management of optical systems and computer hardware for the purpose of network performance monitoring, network security, cyber security, and lawful interception; computer software for Internet security and lawful interception; computer hardware and software for content filtering and lawful interception tools into computer networks and network infrastructure
35
Business management consulting; business marketing and management analysis consulting; social media strategy and marketing consultancy focusing on helping clients create and extend their product and brand strategies by building virally engaging marketing solutions; compiling data and customer user information for social media platforms and purposes
41
Computer education training services; training in the field of cyber-security and data science systems, tools, software, and analytical techniques used in data science and cyber security, policies and procedures and how to evaluate and solve cyber security and data science
42
Computer services, namely, remote management of information technology (IT) systems for others; computer technology support services, namely, help desk services; providing cyber technology solutions, namely, developing, maintaining, managing, advising, consulting and implementing IT programs for third parties; consulting in the field of information technology; computer forensic services, including providing strategy, design and implementation of forensic laboratories; technical support and consulting services in the fields of computer security, vulnerability of computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security software systems for others; information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; providing technology solutions related to cyber-security, namely, advising, consulting, and implementing security measures to ensure confidentiality, integrity and availability of data and information transmitted, stored and shared on computers, computer software, computer hardware and electronic devices; data analytics for social media; providing social media analytics, including storing data, allowing users to identify trends and setup alerts