9
Computer software; automation software; computer software and hardware for performing security and threat assessment, analysis and investigations; application software for cloud computing devices; computer operating systems; computer software packages; downloadable software; computer software to control access to content, websites and portals; security software; enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence reporting
35
Business risk assessment services; Business assistance, management and administrative services; business strategic planning
42
IT services; IT consultancy, advisory and information services; IT security, protection and restoration; Data security consultancy; Providing on-line enterprise security software used for the automation of security operations activities including incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; Providing information in the field of network and internet security in the field of incident response investigation and analysis, threat and vulnerability management, event, alert and alarm analytics, triage, workflow and response, mitigation and remediation orchestration and security intelligence and reporting; computer consultancy services in the field of computer and network security vulnerabilities; computer consultancy services in the field of computer security systems via a global computer network; monitoring of computer systems for security purposes, namely integrating vulnerability testing, vulnerability prioritisation and remediation, managing testing and scanning tools, providing application risk visibility to detect breakdowns and unauthorised access or data breach, and to ensure proper functioning; Consultancy in the field of security software; Software as a service [SaaS]
45
Licensing of software; security services; security consultancy