42
Scientific services, namely, scientific research in the
fields of computer security, application security,
infrastructure security, cloud security, Internet of Things
security, data security, and computer network security, and
product research and design related thereto; software design
and development; design, maintenance, development, and
updating of computer security software and prevention of
computer risks; computer security threat analysis for
protecting data; computer virus and malware protection
services; technical support services, namely,
troubleshooting of computer software and computer security
problems; consulting services in the field of software as a
service (SaaS), platform as a service (PaaS), computer
security software, and cloud security software; providing
temporary use of online non-downloadable security software
and software as a service (SaaS) services for cyber
security, anti-virus, anti-malware, and privacy protection;
providing temporary use of online non-downloadable security
software and software as a service (SaaS) services for
computer security, application security, infrastructure
security, cloud security, Internet of Things security, data
security, and computer network security; providing temporary
use of online non-downloadable software and software as a
service (SaaS) services for online scanning, detecting,
quarantining, and eliminating of viruses, worms, trojans,
spyware, adware, malware, ransomware, grayware, phishing
attempts, and unauthorized data and programs on computers,
networks, and electronic devices; providing temporary use of
online non-downloadable computer software and software as a
service (SaaS) services for detecting, analyzing,
monitoring, displaying, and countering computer security
threats, generating security reports, providing security
alerts, and for security compliance; creating, hosting and
maintaining a website featuring information in the fields of
computers, technology, computer programming, cyber security,
computer security, application security, hardware security,
network security, infrastructure security, operational
security, cloud and hybrid environment security, Internet of
Things security, database security, endpoint security,
security for internet-connected devices, information
security, internet security, information technology,
computer science and technology, privacy, data security and
management, cyber security strategies and countering
security threats, security risk management and response,
security architecture, computer and network threat detection
and remediation, security management and solutions, identity
and access management, security attacks and responses,
security disaster recovery, and exploit analysis;
consulting, advisory, and information services relating to
the aforesaid services
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen