09
Cyber security computer software for the purpose of
protecting IT (information technology), OT (operational
technology) and loT (internet of things) systems, mainly
containing computer workstations, servers, mobile phones, IP
connected devices, industrial control systems, programmable
logical controllers (PLCs), human machine interfaces (HMI),
historian servers and SCADA servers; client and server
computer software for monitoring IT (information
technology), OF (operational technology) and loT (internet
of things) devices and networks, storing and analyzing data
for the purpose of detecting, responding, investigating and
mitigating cyber security threats; computer software for
behavioral analysis, machine learning algorithms and
big-data analytics; user interfaces for the purpose of
investigating and analyzing cyber security threats and for
managing security incidents; computer software for managing
cyber incident response, alert management, response
management, cyber incident investigation, cyber incident
work flow automation and cyber incident data collection and
analysis; APIs (application programming interfaces) for
integrating external systems into detection and incident
response management systems; computer software for
simulating IT (information technology), OT (operational
technology) and loT (internet of things) infrastructures,
traffic and cyber-attacks, and training computer software
for the purpose of cyber security training, network
assessment, tool assessment, vulnerability assessment, and
penetration testing; integrated proprietary, third party and
open source computer software for cyber security systems,
open source intelligence computer hardware arid software for
digital detecting of voice, video, e-mail, instant
messaging, social media interactions, text messages, using
access to worldwide web, intranet, wireless network, and
other multimedia communications transmitted over
telecommunication equipment and networks; computerized
hardware and software used to capture data information and
meta-data capture