09
Computer software and hardware for performing security,
threat, and risk-management assessments, analyses, and
investigations; computer software, namely, software for
management of security breach incidents and responses;
computer software, namely, software for the protection of
digital assets from cyber warfare, computer hacking, and
computer viruses; computer software, namely, software to
monitor and collect systems and network data; computer
hardware, namely, hardware to monitor and collect systems
and network data
36
Cyber insurance analysis, namely, review of insurance
policies; consulting services in the field of
risk-management, namely, providing review of cyber insurance
for online hacking, data breach, and network security;
consulting services in the field of cyber insurance, namely,
review of insurance policies
42
Providing and hosting a secure electronic online system
featuring technology that allows cyber surveillance to
assist in providing defense against data breaches and
privacy violations; computer security consultancy in the
fields of scanning and penetration testing of computers and
networks to assess information security vulnerability;
security information services, namely, customized computer
security platforms that provide real-time analysis of
security alerts generated by network hardware and software,
namely, platform as a services (PAAS) featuring computer
software platforms for computer security; computer security
consultancy; computer software testing to identify security
vulnerability; computer forensic services; computer security
consulting services in the field of maintaining the security
and integrity of databases; computer network security
services and communications network security services in the
nature of network intrusion protection testing, computer
testing for vulnerability management and assessment, risk
management and assessment, data breach threat analysis,
network threat analysis; computer and network incident
response and forensics and penetration testing; computer
security consulting services in the field of critical
incident response to information, computer, and internet
security breaches; computer security consulting services
intended to identify, pursue, and deter threat actors
45
Fraud and identity theft protection services, namely,
accessing, scanning and monitoring of reports, the Internet,
public records, and computer activity and accounts to
facilitate the detection and prevention of data breaches,
identity theft and fraud; monitoring of computer systems for
security purposes; consulting services in the field of data
breach, identity theft and fraud risk-management and
assessment services, fraud detection, and data breach
response, namely, threat assessment and simulation,
vulnerability analysis and mitigation, and emergency
response; consulting services in the field of security
threat assessment, namely, consulting services intended to
identify, pursue, and deter threat actors