9
Computer software and hardware, namely, software and hardware for centralized identification, acquisition, storage, encryption, management, manipulation, joining, analysis and reporting of computer data, computer network data, mobile device data, metadata, files, information and security breach incidents, as well as collection, analysis and monitoring of network traffic, for use in fields of cybersecurity, analytics, computer forensics, e-discovery and litigation; computer software and hardware for detecting, reporting, analyzing and eliminating cyber incidents, such as malware, unauthorized software and network attacks; computer software and hardware system for identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer data and computer network data, metadata, files, information and security breach incidents, for use in security and system intrusion assessment, investigation of damage to or unauthorized use of computer data and files, diagnostics, forensic data investigation, electronic evidence discovery and business loss valuation; computer hardware and software for creating searchable databases of information and data and managing storage devices in a networked environment; computer hardware and downloadable software for litigation support, namely, collecting, storing, sharing, reviewing, searching, managing, categorizing and coding documents
42
Computer consulting services in the field of cybersecurity; computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the websites of others; computer forensic services; data encryption and encoding services; electronic data storage; development of customized software for others for use in risk assessment, information security, business analysis, computer security and security breach analysis; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer diagnostic services; providing an online searchable database in the field of computer forensics, cybersecurity and the elimination of computer viruses; providing a website featuring online non-downloadable software in the field of litigation support, namely, software for collecting, storing, sharing, reviewing, searching, managing, categorizing and coding litigation support documents; providing security assessments of information systems
45
Legal services, namely, intellectual property consulting services in the field of identification and analytics; litigation support services, namely, conducting electronic legal discovery in the nature of reviewing electronically stored information that could be relevant evidence in a lawsuit; litigation support services; providing an online searchable database in the field of litigation support; monitoring of computer systems for security purposes; analyzing and resolving cyber incidents and security breach incidents