9
Computer software and computer hardware; software for secure information exchanging, computer and network security, intruder detection and prevention; computer software for database management in the field of cryptographic network security and data security functions; computer software to enable the management and distribution of information securely; software for the prevention of data leakage; software for the prevention, detection and removal of viruses, adware, spyware and other malware; computer software for encrypting and authenticating data; computer software for encryption; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in operating electronic mail; computer software for use in monitoring computers for security purposes; computer software for use with computer servers for controlling and managing server applications; computer software for use in accessing databases
42
Software engineering and development services; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analysing global computer information network and internal computer network vulnerability; application hosting; scanning, detection and removal of viruses, worms, Trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against network intruders, data theft, counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; information, consultancy and advisory services in relation to the aforesaid