9
Computer hardware with preinstalled software for the detection and assessment of cybersecurity threats; Computer hardware; Computer hardware for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach; downloadable mobile application for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach; Security software; Utility, security and cryptography software; Software for network and device security; Software
42
Technology consultation in the field of cybersecurity; Software as a Service (SAAS) services, namely, hosting software for use by others for use to facilitate cybersecurity protection, and monitoring and assessment of network threats; Computer security threat analysis for protecting data; Cybersecurity services, namely cybersecurity threat analysis services; Monitoring of computer systems for detecting unauthorized access or data breach; IT security, protection and restoration; Authentication services for computer security; Internet security consultancy; Data security consultancy; Maintenance of computer software; Computer software design; Computer software technical support services; Updating of computer programs