9
Security software; computer software for encrypting and authenticating data; computer software, namely, cyber security software; computer software for computer security, computer network security and information security purposes; computer software in the field of the security risk industry, namely, computer security software; computer software for managing computer security strategy and resources; computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats
37
Services for enhancing the performance, function and security of computer networks, namely, installation and maintenance of computer hardware; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware; upgrading of computer hardware; installation of Access Control as a Service [ACaaS] hardware
42
Computer network security services; computer security consultancy; design and development of electronic data security systems; developing computer software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; computer consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk; providing online nondownloadable software in the field of computer security; Software as a Service (SAAS) services featuring computer security and risk assessment and remediation; Platform as a Service (PAAS) services featuring computer security and risk assessment and remediation; providing online non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing online non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing firmware based devices; providing online non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing online non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation and cyber incident data collection and analysis; providing online non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; installation, maintenance and repair of computer software