09
Devices and apparatus for recording, capturing, processing,
transmitting, receiving, reading, storing, displaying,
exporting and playing data, messages, text, speech, audio
signals, pictures (as far as comprised in this class);
computers, data processing apparatus, computer peripheral
devices, computer firmware, IT-platforms,
IT-infrastructures, IT-security devices, information risk
management devices, and parts thereof; computer programs,
computer software, computer operating programs, also
recorded or downloadable and/or as updates; data media, also
recorded; interfaces for computers; cards with integrated
circuits; all of the afore mentioned goods in this class in
particular in the field of information technology (IT),
IT-security, information risk management,
IT-security-technology, IT-security-systems,
IT-security-solutions, perimeter security, content security,
web application security, network security, mobile security,
intrusion detection, intrusion prevention, authentication,
in particular in the field of virus protection, spam
protection, spyware protection, computer security, network
security, internet security, data protection, decryption and
encryption of data, protection of unauthorized intrusions,
system monitoring, protection of mobile devices, identity
and/or access management, policy compliance, e-mail
management, vulnerability and threat management, risk
management, content-, managed perimeter-, infrastructure
security, Virtual Private Network (VPN), remote access,
secure communication links, firewall systems
35
Advertising; business management; business administration;
office functions; compiling of different goods and services
for others in the field of computer and telecommunication
networks, IT-platforms, IT-infrastructures, computer
hardware, computer software, IT-security, information risk
management, IT-security-systems, IT-security-solutions, in
order to facilitate the inspection and purchase of such
goods and services, also by use of electronic media;
business inquiries; business management and organization
consultancy; commercial information and advice for
consumers; advisory services for business management;
procurement services for others; professional business
consultancy; business investigations, information, research;
compilation of statistics; business appraisals; business
management assistance; commercial administration of the
licensing of the goods and services of others; business
research; computerized file management; systemization and
compilation of information into computer databases;
publicity; publication of publicity texts; all of the afore
mentioned services in this class in particular in the field
of information technology (IT), IT-security, information
risk management, IT-security-technology,
IT-security-systems, IT-security-solutions, perimeter
security, content security, web application security,
network security, mobile security, intrusion detection,
intrusion prevention, authentication, in particular in the
field of virus protection, spam protection, spyware
protection, computer security, network security, internet
security, data protection, decryption and encryption of
data, protection of unauthorized intrusions, system
monitoring, protection of mobile devices, identity and/or
access management, policy compliance, e-mail management,
vulnerability and threat management, risk management,
content-, managed perimeter-, infrastructure security,
Virtual Private Network (VPN), remote access, secure
communication links, firewall systems
37
Installation services; repair services; installation and
repair of computer and telecommunication networks,
IT-platforms, IT-infrastructures and computer hardware;
installation and repair of apparatus and devices of
information technology (IT), IT-security-technology,
information risk management technology, IT-security-systems,
IT-security-solutions; repair information; all of the afore
mentioned services in this class in particular in the field
of information technology (IT), IT-security, information
risk management, IT-security-technology,
IT-security-systems, IT-security-solutions, perimeter
security, content security, web application security,
network security, mobile security, intrusion detection,
intrusion prevention, authentication, in particular in the
field of virus protection, spam protection, spyware
protection, computer security, network security, internet
security, data protection, decryption and encryption of
data, protection of unauthorized intrusions, system
monitoring, protection of mobile devices, identity and/or
access management, policy compliance, e-mail management,
vulnerability and threat management, risk management,
content-, managed perimeter-, infrastructure security,
Virtual Private Network (VPN), remote access, secure
communication links, firewall systems
38
Telecommunications; providing user access to computer and
telecommunication networks, IT-platforms,
IT-infrastructures, data and information, data bases,
computer software; providing of secure internet accesses;
message sending; electronic mail and internet services, in
particular filtering of electronic mail and internet content
for third parties; providing of interactive communication
networks and data processing systems for the transmission of
data and information; transmission of data and information;
protecting communication links; telecommunications routing
and junction services; communications by telephone and
computer terminals; providing of a support centre, a call
centre, an information hotline, an emergency hotline; all of
the afore mentioned services in this class in particular in
the field of information technology (IT), IT-security,
information risk management, IT-security-technology,
IT-security-systems, IT-security-solutions, perimeter
security, content security, web application security,
network security, mobile security, intrusion detection,
intrusion prevention, authentication, in particular in the
field of virus protection, spam protection, spyware
protection, computer security, network security, internet
security, data protection, decryption and encryption of
data, protection of unauthorized intrusions, system
monitoring, protection of mobile devices, identity and/or
access management, policy compliance, e-mail management,
vulnerability and threat management, risk management,
content-, managed perimeter-, infrastructure security,
Virtual Private Network (VPN), remote access, secure
communication links, firewall systems
41
Education; teaching; providing of training; all of the afore
mentioned services in particular in the field of computers,
networks, IT-platforms, IT-infrastructures, data bases,
internet, computer software, computer hardware, computer
peripheral devices, computer firmware, computer systems, the
design of computer software, IT security and information
risk management; arranging and conduction of seminars,
symposiums, trainings, workshops, congresses, conferences,
colloquiums, in particular in connection with computers,
networks, IT-platforms, IT-infrastructures, data bases,
internet, computer software, computer hardware, computer
peripheral devices, computer firmware, computer systems, the
design of computer software, IT security and information
risk management; publication of information (as far as
covered by this class), books, texts (other than publicity
texts), journals, also in electronic fashion; all of the
afore mentioned services in this class in particular in the
field of information technology (IT), IT-security,
information risk management, IT-security-technology,
IT-security-systems, IT-security-solutions, perimeter
security, content security, web application security,
network security, mobile security, intrusion detection,
intrusion prevention, authentication, in particular in the
field of virus protection, spam protection, spyware
protection, computer security, network security, internet
security, data protection, decryption and encryption of
data, protection of unauthorized intrusions, system
monitoring, protection of mobile devices, identity and/or
access management, policy compliance, e-mail management,
vulnerability and threat management, risk management,
content-, managed perimeter-, infrastructure security,
Virtual Private Network (VPN), remote access, secure
communication links, firewall systems
42
Scientific and technological services and research and
design relating thereto; industrial analysis and research
services; engineering; technical research; technical
consultancy in the field of computer hardware, computer
software, information technology (IT), IT-security,
information risk management, IT-security technology,
IT-security systems, IT-security solutions, perimeter
security, content security, web application security,
network security, mobile security, intrusion detection,
intrusion prevention and authentication; technical surveys;
technical project studies; technical analysis; technical
project management; technical evaluations; services of a
physicist; services of a software engineer; information
security consulting, in particular in the field of security
governance, management and strategy, assets and risk
management, compliance, standards and regulations, threats
and vulnerabilities, technical architecture, programme and
project management; technology security consulting, in
particular in the field of assessments and reviews, design
and audit, configuration, deployment and policies, risk
assessments, support management, asset management and
decommission; providing IT security solutions and
information risk management solutions; computer software and
computer hardware consultancy; computer system design;
computer software design; installation and repair of
computer software; computer programming; computer protection
services; computer systems analysis; recovery of computer
data; design, development, installation, configuration,
updating, implementation, integration, maintenance,
modification, extension of computer software, computer
software updates, downloadable computer software, data
bases, operation systems, computer networks, IT-platforms,
IT-infrastructures; design, development and configuration of
computer hardware; cloud deployment services; computer
software and hardware technical support services, also
remote, via hotline or telephone; managed security services
in the field of computer hardware, computer software,
computer software updates, downloadable computer software,
data bases, operation systems, computer and
telecommunication networks, IT-platforms,
IT-infrastructures; data backup services; data storage
services; analysis, processing and integration of data;
technical administration of accesses to computer networks;
provision of technical security directives; inspection of
technical guidelines and processes; all of the afore
mentioned services in this class in particular in the field
of information technology (IT), IT-security, information
risk management, IT-security-technology,
IT-security-systems, IT-security-solutions, perimeter
security, content security, web application security,
network security, mobile security, intrusion detection,
intrusion prevention, authentication, in particular in the
field of virus protection, spam protection, spyware
protection, computer security, network security, internet
security, data protection, decryption and encryption of
data, protection of unauthorized intrusions, system
monitoring, protection of mobile devices, identity and/or
access management, policy compliance, e-mail management,
vulnerability and threat management, risk management,
content-, managed perimeter-, infrastructure security,
Virtual Private Network (VPN), remote access, secure
communication links, firewall systems