09
Computer software and hardware for performing security,
threat, and risk-management assessments, analyses, and
investigations; computer software, namely, software for
management of security breach incidents and responses;
computer software, namely, software for the protection of
digital assets from cyber warfare, computer hacking, and
computer viruses; computer software, namely, software to
monitor and collect systems and network data; computer
hardware, namely, hardware to monitor and collect systems
and network data
36
Cyber insurance analysis, namely, review of insurance
policies; consulting services in the field of
risk-management, namely, providing review of cyber insurance
for online hacking, data breach, and network security;
consulting services in the field of cyber insurance, namely,
review of insurance policies
42
Hosting a secure electronic online platform and website
featuring software that allows cyber surveillance to assist
in providing defense against data breaches and privacy
violations; computer security consultancy in the fields of
scanning and penetration testing of computers and networks
to assess information security vulnerability; platform as a
service (PAAS) featuring computer software platforms for
security information services and customized computer
security that provides real- time analysis of security
alerts generated by network hardware and software; computer
security consultancy; computer software testing to identify
security vulnerability; computer forensic services; computer
security consulting services in the field of maintaining the
security and integrity of databases; computer network
security services and communications network security
services in the nature of network intrusion protection
testing, computer testing for vulnerability management and
assessment, risk management and assessment, data breach
threat analysis, and network threat analysis; computer and
network incident response and forensics and penetration
testing; computer security consulting services in the field
of critical incident response to information, computer, and
Internet security breaches; computer security consulting
services intended to identify, pursue, and deter threat
actors; computer security services for protecting data and
information from unauthorized access, namely, accessing,
scanning, and monitoring of reports, the Internet, public
records, and computer activity and accounts to facilitate
the detection and prevention of data breaches, identity
theft, and fraud; computer security services for protecting
data and information, namely, providing monitoring of
customer computer systems against unauthorized access;
consulting services in the field of data breach, identity
theft, and fraud risk-management and assessment services,
fraud detection, and data breach response, namely, data
breach threat assessment and simulation, data breach
vulnerability analysis and mitigation, and data breach
emergency response; consulting services in the field of
security data breach threat assessment, namely, consulting
services intended to identify, pursue, and deter data breach
threat actors