9
Data processing equipment and computer software for cyber security purposes; Computer software for scanning and blocking viruses; Security software for analysing log files; Computer platforms for cyber security and information technology security purposes; Computer software for managing and eliminating business vulnerabilities and satisfying security accreditation and certification, namely computer software for evaluating and correcting vulnerabilities in computer networks and for automating, managing and monitoring compliance with regulations, risk management, corporate governance and security accreditation and certification; Computer software consisting of internet-based and telecommunications-based applications in relation to cyber security; Downloadable computer software and software applications for cyber security purposes for detecting, analysing and mitigating computer viruses, malware, network anomalies, security breaches and sophisticated persistent attacks
38
Telecommunication services, namely providing connections to computer networks or cloud environments, providing online communications services via computer networks, mobile networks, internet or cloud environments, electronic mail, message sending and receiving; Transmission and distribution of data via computer networks, mobile networks, the internet or cloud environments
42
Development and design of computer software in the field of cyber security and secure network activities; Computer security, namely providing, restricting and managing access rights for users of computer resources for cloud, mobile or network resources based on attributed references; Maintenance and updating of computer software in the field of cyber and computer security; Maintenance and updating of computer software for preventing risks in online environments and computer networks; Data and internet and computer security consultancy; Data and internet and computer security, namely restriction of unauthorised access to hard drives, computer networks, websites and cloud environments, digital certificate management; Analysis of computer security threats for protecting data; IT security support, namely keeping data and applications secure and maintaining compliance of data with national and international privacy regulations, resulting in data visibility and accountability; Analysis of data traffic on computer networks; Consultancy in the field of information technology, namely advice in the field of evaluating, correcting and managing vulnerabilities in computer networks and security activities, compliance with legislation and regulation, risk management, corporate governance, network certification and accreditation and cyber security; Data security; Computer security system monitoring; Analysis of computers and networks for evaluating vulnerability to information security and cyber threats; Development of customised plans for improving computer security and preventing unlawful or risky activities; Research in the field of cyber intelligence technology and cyber security technology; Software as a service (SaaS) or application service provider (ASP) services, namely hosting of software applications, for others, in the field of computer and network analysis for evaluating the vulnerability of information security and cyber threats