09
Downloadable computer software for performing security,
threat, and risk-management assessments, analyses, and
investigations; downloadable computer software, namely,
software for management of security breach incidents and
responses; downloadable computer software, namely, software
for the protection of digital assets from cyber warfare,
computer hacking, and computer viruses; recorded computer
databases in the field of computer software protection,
security threat assessment and threat actor identification,
pursuit, and deterrence, cybersecurity, computer security,
information security, data security, data breach, identity
theft, and fraud risk-management and assessment, and
encryption technology recorded on computer media;
downloadable computer software for scanning, detecting,
removing and preventing viruses, worms, Trojan horses,
adware, spyware, and other malware in the field of computer
software protection; downloadable operating software in the
nature of computer software for scanning, detecting,
removing and preventing viruses, worms, Trojan horses,
adware, spyware, and other malware in the field of computer
software protection; downloadable computer software for
monitoring and analysis, namely, for scanning, detecting,
removing and preventing viruses, worms, Trojan horses,
adware, spyware, and other malware; downloadable computer
software for use in monitoring use of computers for security
purposes; downloadable computer software for the detection
and removal of computer viruses and threats; downloadable
computer software for detecting and repairing computer
software and hardware problems; downloadable computer
software for scanning, detecting, and removing viruses,
worms, Trojan horses, adware, spyware, and other malware;
downloadable computer optimization software for the
protection and running of computer hardware
42
Providing and hosting a secure electronic online system
featuring technology that allows cyber surveillance to
assist in providing defense against data breaches and
privacy violations; computer security consultancy in the
fields of scanning and penetration testing of computers and
networks to assess information security vulnerability;
security information services, namely, customized computer
security platforms that provide real-time analysis of
security alerts generated by network hardware and software,
namely, platform as a service (PAAS) featuring computer
software platforms for computer security; computer security
consultancy; computer software testing to identify security
vulnerability; computer forensic services; computer security
consulting services in the field of maintaining the security
and integrity of databases; computer network security
services and communications network security services in the
nature of network intrusion protection testing, computer
testing for vulnerability management and assessment, risk
management and assessment, data breach threat analysis,
network threat analysis; computer and network incident
response and forensics and penetration testing; computer
security consulting services in the field of critical
incident response to information, computer, and internet
security breaches; computer security consulting services
intended to identify, pursue, and deter threat actors;
computer software development, design, and implementation
services in the field of security for computers and computer
networks; computer systems analysis in the field of security
for computers and computer networks; computer consultation
regarding computer networks and internal computer networks
and security services for computer networks and internal
computer networks, namely, installation, design and
customization of computer security platforms; computer
consulting services in the field of security integration,
network security, encryption technology, and computer
security; software as a service (SAAS) services featuring
software for use in scanning networks and websites to detect
and identify vulnerabilities and malware; computer
programming of internet security programs; design and
development of computer software programs for Internet
security; data security services, namely, design and
development of internet security software and electronic
data security systems; design and development of electronic
data security systems; updating of computer software
relating to computer security and prevention of computer
risks and risk management; maintenance of computer software
relating to computer security and prevention of computer
risks and risk management; development of technologies,
namely, computer software development for scanning,
detecting, removing and preventing viruses, worms, Trojan
horses, adware, spyware, and other malware for the
protection of electronic networks; providing technical
information and technical advisory services related to
computer software, computer networks, computer and data
security, network security, computer security integration,
and encryption technology; electronic monitoring of
personally identifying information to detect identity theft
via the Internet; monitoring of computer systems for
detecting unauthorized access or data breach; data security
consultancy in the fields of data breach, identity theft and
fraud risk-management and assessment services, fraud
detection, and data breach response, threat assessment and
simulation, vulnerability analysis and mitigation, and
emergency response; data security consultancy in the field
of security threat assessment and threat actor
identification, pursuit, and deterrence; monitoring of
computer systems, and data network systems, and the Internet
for security and risk assessment purposes, namely, detecting
unauthorized access or data breach; electronic monitoring
services for security purposes in the field of computer and
internet services, namely, monitoring of computer systems
for detecting unauthorized access or data breach