9
Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances and security software applications; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer malware, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; software for use in managing online consumer privacy issues; computer software that performs collection of security information and analyzes it based on multiple algorithms to identify security risks; security analytics software for monitoring network security and identifying threats and vulnerabilities
35
Management of computer databases; computerised data processing; providing data searches in computer files for others; data logging, data retrieval services; data services, namely capturing, searching, exploring, identifying, analysing, processing, managing, monitoring, aggregating and modelling of data for business purposes; business data analysis and analytics; business research services; business process modelling; business modelling to support operational risk analysis; business risk management services; business services relating to security, cyber security, computer security, security software, encryption, information assurance, product assurance, information technology and computer risk; preparation of business risk reports, commercial reports and economic reports; collecting cyber security intelligence data; information, advisory and consultancy services relating to all the aforesaid services
42
Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analysing, integrating, repairing, and managing of cyber-security systems; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; monitoring of cyber security intelligence data; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; development, updating and maintenance of software for networks and standalone computers in the fields of security; computer consulting services in the field of analysing security intelligence data to uncover threats and prioritize, prevent against future attacks, simplify management of security data; providing services in the field of unified security analytics, mainly, to measure, track and reduce cyber security risks and identify anomalous activity across computer networks; Technical consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; data services, namely storing of electronic data