9
Automation software; computer software and hardware for performing security and threat assessment, analysis and investigations; application software for cloud computing devices; computer operating systems; computer software packages; downloadable software; computer software to control access to content, websites and portals; security software; enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence reporting; all of the aforementioned goods only to be used in relation to automation and security, also as no-code/low-code
35
Business risk assessment services; Business assistance, management and administrative services; business strategic planning
42
IT consultancy, advisory and information services; IT security, protection and restoration; Data security consultancy; Providing on-line enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; Providing information in the field of network and internet security in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network; monitoring of computer systems for security purposes, namely integrating vulnerability testing, vulnerability prioritisation and remediation, managing testing and scanning tools, providing application risk visibility to detect breakdowns and unauthorised access or data breach, and to ensure proper functioning; Consultancy in the field of security software; Software as a service [SaaS]; all of the aforementioned services only to be used in relation to automation and security, also as no-code/low-code
45
Security services; security consultancy