09
Security software; software reliability software; threat
data detection software; threat data analysis software;
threat monitoring software; cloud network monitoring
software; real-time threat monitoring software with
intuitive dashboards and customs alert; software for
scanning, detecting, removing viruses, worms, Trojan horses,
adware, spyware and malware; software to protect software
applications against suspicious activity and malicious
users; software for providing mobile phone security;
software for providing intrusion detection and prevention;
software for data communications applications, and for the
encryption and authentication of electronic information;
fraud protection software; encryption software to enable
secure transmission of digital information; software in the
field of data security functions; application software;
application software for mobile phones; computer software
for controlling and managing access server applications;
data processing software; software for secure storage;
software for checking the security of the device and the
application environment; software for optimizing
applications; software for risk estimation
42
Software as a service; software development, programming and
implementation; computer programming; database design;
design services relating to computer software; design
services for data processing systems; design of software
packages; development, design, implementation, testing,
analysis and consulting services in the field of security,
access, authorization, authentication, encryption and
identification software systems for computers, networks,
mobile phones and other electronic devices; development of
technologies for the protection of software applications;
computer systems integration services; development of
operating system software and administration of user rights
in computer networks; computer support services, namely,
computer software technical support services and software
updating services; maintenance of software; technological
services related to network, internet, computer, mobile
phone security testing; surveying, technological research
and studies; arranging and conducting technical surveys;
surveying and providing scientific expertise; computer
security threat analysis for protecting data