09
Computer hardware and computer peripherals; computer
software; computer programs; computer operating system
software; electronic publications; computer security
software; computer monitoring software; computer software
for detecting computer system failure and problems; computer
software for comparing and analyzing conditions of computer
systems; computer analysis and detection software which
automatically disconnect system from network when detecting
system failure; cyber security software for protecting
against cyber threats; computer hardware and software for IT
security; computer hardware and software for use in
intrusion detection, network security monitoring, and log
management; computer software for data protection
35
Providing business assistance, consultancy and advisory
services; business development services; business
management, consultation and planning; business research;
business consulting services; business management
consulting; business management analysis and consultancy
relating to security
42
Configuration, installation, fault diagnosis, repair,
upgrading and maintenance of computer software; computer
software design; technical support and consulting services
in the field of cyber security; computer systems risk
analysis; cyber security analytics and alerting; computer
security threat analysis for protecting data; updating of
computer software relating to computer security and
prevention of computer risks; preparation of technical
reports relating to research in the field of computer
hardware and software; recovery of computer data;
troubleshooting of computer software problems [technical
support]; integration of computer systems and networks;
design and development of computer software, systems and
networks; providing information about the design and
development of computer software, systems and networks;
monitoring of computer systems by remote access; development
of software for secure network operations; computer security
consultancy; consulting services in the field of design,
selection, implementation and use of computer hardware,
software systems and networks; computer and Internet
security consultancy and data encryption services;
technology consultation services in the fields of
information and communications technology; providing
technical advice relating to computers; technical advisory
services relating to computer programs; cloud computing