9
software for assessing and correcting computer network vulnerabilities, intrusion detection, managing computer software updates, and managing regulatory compliance, security accreditation and certification; computer software for computer system security and enterprise system management; computer software for monitoring computer networks, computer systems security and computer enterprise systems; Computer documentation in electronic form
38
Telecommunication services; Telecommunication services provided via Internet platforms and portals; Communication services between database systems; Providing of access to database systems on computer networks; Providing user access to portals on the Internet, Providing of user access to mobile applications; Consultancy in the field of telecommunications
42
Software as a service [SaaS] for assessing and correcting computer network vulnerabilities, intrusion detection, managing computer software updates, and managing regulatory compliance, security accreditation and certification; Providing of software and mobile applications [non-downloadable] for assessing and correcting computer network vulnerabilities, intrusion detection, managing computer software updates, and managing regulatory compliance, security accreditation and certification; Software as a service [SaaS] for computer system security and for managing business systems; Software as service [SaaS] for monitoring computer networks computer system security and computer business systems; Hosting of platforms on the internet for assessing and correcting computer network vulnerabilities, intrusion detection, managing computer software updates, and managing regulatory compliance, security accreditation and certification; Research, Design, Development, creation, deployment, Implementation, Servicing, Counselling, Updating, in relation to the following goods: Software solution services, IT services, in relation to the following fields: cybersecurity and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; Counselling, Management services, in relation to the following fields: IT infrastructure and software vulnerability management and vulnerability patch management; Quality audits; Preparation of technological reports; Expertise and drafting of reports relating to assessing and correcting computer network vulnerabilities, intrusion detection, managing computer software updates, and managing regulatory compliance, security accreditation and certification
45
Legal compliance auditing; Regulatory compliance auditing