9
Automation software; application software for cloud computing devices; computer software and hardware for performing security and threat assessment, analysis and investigations; Computer software; Computer software packages; computer software to control access to content, websites and portals; Downloadable software; Software for data processing management; Computer programmes for data processing; Enterprise security software for the automation of security processes, including the examination and analysis of events, the management of threats and weak points, the analysis of occurrences, warnings and alarms, triage, work processes and reaction, the orchestration of damage limitation and troubleshooting and security information and reports
35
Business consulting, in relation to the following fields: Cloud computing; Business strategy planning; Administrative assistance for companies, Management and administration services for businesses
42
Scientific and technological services and research and design relating thereto; Quality control and authentication services; Design and development of computer hardware and software; Software as a service [SaaS]; Hosting of computer sites (websites); Design of computer software and computerised systems; Website and computer system analysis; Website support; Website monitoring; Services in the field of information technology security (IT security); Creation, and maintenance of web sites; Computer security consultancy; Services and consultancy in the field of information technology; Cloud computing; Development of computer platforms; Rental of computers and computer software; Maintenance of computer software; Consultancy in the field of security software; Information technology consultancy, advisory and information services; Technical consultancy; Data security consulting; Consultancy in the field of computers, Relating to the following sectors: computer and network security vulnerabilities; Providing of information in the field of network and internet security in the fields of incidents, management of threats and weak points, analysis of occurrences, warnings and alarms, triage, work processes and reaction, orchestration of remedial measures and security information and reports; Information technology services in the fields of computer centre architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services