09
Computer hardware and software for cybersecurity to identify
and protect against security threats; computer anti-virus
software; anti-spyware software; computer software and
computer hardware for detection, blocking, and facilitating
removal and remediation of computer viruses, rootkits,
bootkits, backdoors, zero-day attacks, data exfiltration,
phishing, bots, time bombs, worms, cyber-attacks, malicious
attacks, and advanced persistent threats; computer software
for preventing malicious attacks on, and unauthorized
activities and intrusions in, computers, computer systems,
software applications, digital devices; computer software
and hardware providing secure networks over virtual computer
systems and virtual computer environments; computer firmware
and computer software for enhancing industrial automation
and for assessing and identifying vulnerabilities and cyber
security threats and risks in control system infrastructure,
computer control systems, and devices, and for testing the
effectiveness of cyber security applications, devices, and
systems to achieve optimal network security, all in the
field of cyber security vulnerability testing and
prevention
37
Technical support services, namely, installation and
troubleshooting of computer hardware in the nature of
installing and repairing cyber security hardware and
platforms all in the field of cyber security; maintenance
and repair of computer hardware
41
Training in the use and operation of computer software,
hardware, computer networks and platforms all in the field
of cyber security
42
Design and development of computer hardware and software;
computer software consulting; developing customized software
for others; computer services, namely, designing and
implementing cyber security and privacy requirements and
protocols in information technology systems for others;
information technology consulting services; maintenance of
computer software relating to computer security and
prevention of computer risks; planning, design and
implementation of computer technologies for others; updating
of computer software relating to computer security and
prevention of computer risks; software as a service (SAAS)
services featuring software for use in detecting, reporting,
analyzing and eliminating cyber incidents, namely, malware,
unauthorized software and network attacks; software as a
service (SAAS) services featuring software for use in
identification, acquisition, storage, encryption,
management, manipulation, analysis and reporting of security
breach events of computer and computer network data,
metadata, data files, and information; software as a service
(SAAS) services featuring software for use in secure
cross-enterprise data collaboration, workflow auditing and
reporting, data management and sharing, identity management,
access control, and data backup and recovery in the field of
cyber security; computer consultation in the field of
computer security; computer security consultancy in the
field of scanning and penetration testing of computers and
networks to assess information security vulnerability;
scientific and technological services, namely, research and
design in the field of cyber security systems; computer
security consulting services in the field of cyber security;
platform as a service (PAAS) featuring computer software
platforms used for monitoring industrial network security in
the field of cyber security; consulting services in the
field of testing and assessing networked devices for cyber
security vulnerabilities and risks; computer consultation in
the field of cyber security, namely, providing approvals
that minimum security levels have been achieved in the field
of cyber security vulnerability testing of networked
devices; technical support services, namely, installation,
administration, and troubleshooting of computer software in
the field of cyber security
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen