9
Security software; Software reliability software; Threat data detection software; Threat data analysis software; Threat monitoring sotware; Cloud network monitoring software; Real-time threat monotoring software with intuitive dashboards and customs alert; Software for scanning, detecting, removing viruses, worms, trojan horses, adware, spyware and malware; Software to protect software applications against against suspicious activity and malicious users; software for providing mobile phone security; software for providing intrusion dectection and prevention; software for data communications applications, and for the encryption and authentication of electronic information; fraud protection software; encryption software to enable secure transmission of digital information; software in the field of data security functions; application software; application software for mobile phones; computer software for controlling and managing access server applications; data processing software; software for secure storage; software for checking the security of the device and the application environment; software for optimizing applications; software for risk estimation
42
Software as a service; Software development, programming and implementation; computer programming; database design; design services relating to computer software; design services for data processing systems; design of software packages; development, design, implementation, testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification systems for computers, networks, mobile phones and other electronic devices; development of technologies for the protection of software applications; systems integration services; administration of networks and systems; computer support services, namely, technical support and software update services; maintenance of software; technical services related to network, internet, computer, mobile phone security testing; surveys, advice and technical appraisals; Computer security threat analysis for protecting data