9
Computer hardware and software; computer hardware and software for IT security; computer hardware and software for use in intrusion detection, network security monitoring, and log management; computer software for data protection
42
Computer security consultancy; consultancy in the field of security software; computer, security services for protection against illegal network access; computer virus protection services; programming of Internet security programs; design and development of Internet security software; maintenance and updating of computer software relating to computer security and prevention of computer risks; monitoring of computer systems, computer security systems, computer programs and website by remote access; providing information and advice relating to monitoring of computer systems, computer security systems, computer programs and website by remote access; troubleshooting of computer software problems; design and development of computer software, computer firmware, computer hardware and computer systems; providing information about the design and development of computer software, systems and networks; consultancy services in the field of design, selection, implementation and use of computer hardware and software systems; consultancy in the field of cyber security monitoring services; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; technical research in the field of computer security and cyber security; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behavior in connection with computer operating systems, computer networks and communications networks; computer system analysis; providing computer security analysis; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen