9
Computer hardware and software; computer hardware and software for IT security; computer hardware and software for use in intrusion detection, network security monitoring, and log management; computer software for data protection
42
Computer security consultancy; consultancy in the field of security software; computer, security services for protection against illegal network access; computer virus protection services; programming of Internet security programs; design and development of Internet security software; maintenance and updating of computer software relating to computer security and prevention of computer risks; monitoring of computer systems, computer security systems, computer programs and website by remote access; providing information and advice relating to monitoring of computer systems, computer security systems, computer programs and website by remote access; troubleshooting of computer software problems; design and development of computer software, computer firmware, computer hardware and computer systems; providing information about the design and development of computer software, systems and networks; consultancy services in the field of design, selection, implementation and use of computer hardware and software systems; consultancy in the field of cyber security monitoring services; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; technical research in the field of computer security and cyber security; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behavior in connection with computer operating systems, computer networks and communications networks; computer system analysis; providing computer security analysis; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment