9
Software, applications, hardware, systems and devices for monitoring and alerting unusual anomalies in data transfer; Software, applications, hardware, systems and devices, namely for protection of viruses, malware, cyber-attack and unauthorized infiltration of and to devices such as smartphones, tablets, computers, networks, databases, operation systems, cloud storage, wired and wireless communication systems and hardware; Software, applications, hardware, systems and devices, namely for protection of viruses, malware, cyber-attack and unauthorized infiltration of and to devices such as physical security elements, access control elements, intrusion systems elements, fire systems elements, video elements, video management systems, control system elements; Security software; Antimalware software; Antivirus software; Privacy protection software, application, hardware and devices
42
Research and development of computer hardware and software; Computer programming services for others in the fields of computers, computer systems and electronic communications networks; Collection, compilation and analysis of data for the purpose of generating and transmitting reports on regarding security and protection of digital networks, systems and devices; Computer services, namely providing computer software consultancy, testing, research and advisory services in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; Computer services, namely providing computer software consultancy, testing, research and advisory services in the field of physical security systems and networks, access control systems and networks, intrusion system systems and networks, fire systems and networks, video analytics systems and networks, video management systems and networks and control systems and networks; On-line information and advisory services relating to computer security; Technical support services, namely, troubleshooting and maintenance of computer software and computer network issues