9
Software and applications for cyber security purposes; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software and applications for wireless devices; Computer application software for mobile phones; Cloud servers; Cloud computing software; Wireless routers; Computer network routers; Computer hardware; Computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications
35
Business management consulting services in the field of information technology; Data processing, systematisation and management; Collection of data; Computerised data processing; Management and compilation of computerised databases; Retail and wholesale services in relation to information technology equipment and computer software; Information, advisory and consultancy services relating to all the aforesaid services
38
Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; information, advisory and consultancy services relating to all the aforementioned services
41
Education; providing of training; Arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable
42
Scientific and technological services and research and design relating thereto; Industrial analysis, industrial research and industrial design services; design and development of computer hardware and software; development of new technology for others; development of technologies for the protection of electronic networks; development of new technology and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; consultancy in the field of cyber security, Internet security, computer security, computer network security and data security; researching, designing, developing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; network protection services; data compression services; data leakage prevention services; IT services; IT consultancy, advisory and information services; IT security, protection and restoration services; Information technology support services; technical support services relating to computer software and applications; monitoring of network and computer systems; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; Providing online, non-downloadable software; Providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud services; administration of cloud services, arranging of cloud services; cloud-based data protection services; quality control and authentication services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services
45
Licensing of technology; licensing services; information, advisory and consultation services in the field of data theft and identity theft; providing information and consultation relating to security