9
Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; Computer application software for mobile phones; Cloud servers; Cloud computing software; Wireless routers; Computer network routers; Computer hardware; Computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; Computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); Computer application software for use in implementing the Internet of Things (IoT); Computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); Software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); Embedded software; Embedded software for use in implementing cyber security solutions for the Internet of Things (IoT)
35
Data processing, systematisation and management; Collection of data; Computerised data processing; Management and compilation of computerised databases; Retail and wholesale services in relation to information technology equipment and computer software; Information, advisory and consultancy services relating to all the aforesaid services
38
Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services
41
Education; providing of training; Arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable
42
Technological services; design and development of computer hardware and software; researching, designing, developing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; network protection services; data compression services; data leakage prevention services; IT consultancy, advisory and information services; IT security, protection and restoration services; Information technology support services; technical support services relating to computer software and applications; monitoring of network and computer systems; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; Providing online, non-downloadable software; Providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud services; administration of cloud services, arranging of cloud services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services