09
Computer hardware and software for cybersecurity to identify
and protect against security threats; computer anti-virus
software; anti-spyware software; computer software and
computer hardware for detection, blocking, and facilitating
removal and remediation of computer viruses, rootkits,
bootkits, backdoors, zero-day attacks, data exfiltration,
phishing, bots, time bombs, worms, cyber-attacks, malicious
attacks, and advanced persistent threats; computer software
for preventing malicious attacks on, and unauthorized
activities and intrusions in, computers, computer systems,
software applications, digital devices; computer software
and hardware providing secure networks over virtual computer
systems and virtual computer environments; computer firmware
and computer software for enhancing industrial automation
and for assessing and identifying vulnerabilities and cyber
security threats and risks in control system infrastructure,
computer control systems, and devices, and for testing the
effectiveness of cyber security applications, devices, and
systems to achieve optimal network security, all in the
field of cyber security vulnerability testing and
prevention
37
Technical support services, namely, installation and
troubleshooting of computer hardware in the nature of
installing and repairing cyber security hardware and
platforms all in the field of cyber security; maintenance
and repair of computer hardware
41
Training in the use and operation of computer software,
hardware, computer networks and platforms all in the field
of cyber security
42
Design and development of computer hardware and software;
computer software consulting; developing customized software
for others; computer services, namely, designing and
implementing cyber security and privacy requirements and
protocols in information technology systems for others;
information technology consulting services; maintenance of
computer software relating to computer security and
prevention of computer risks; planning, design and
implementation of software and technology solutions for
others; updating of computer software relating to computer
security and prevention of computer risks; software as a
service (SAAS) services featuring software for use in
detecting, reporting, analyzing and eliminating cyber
incidents, namely, malware, unauthorized software and
network attacks; software as a service (SAAS) services
featuring software for use in identification, acquisition,
storage, encryption, management, manipulation, analysis and
reporting of security breach events of computer and computer
network data, metadata, data files, and information;
software as a service (SAAS) services featuring software for
use in secure cross-enterprise data collaboration, workflow
auditing and reporting, data management and sharing,
identity management, access control, and data backup and
recovery in the field of cyber security; computer
consultation in the field of computer security; computer
security consultancy in the field of scanning and
penetration testing of computers and networks to assess
information security vulnerability; scientific and
technological services, namely, research and design in the
field of cyber security systems; computer security
consulting services in the field of cyber security; platform
as a service (PAAS) featuring computer software platforms
used for monitoring industrial network security in the field
of cyber security; consulting services in the field of
testing and assessing networked devices for cyber security
vulnerabilities and risks; computer consultation in the
field of cyber security, namely, providing approvals that
minimum security levels have been achieved in the field of
cyber security vulnerability testing of networked devices;
technical support services, namely, installation,
administration, and troubleshooting of computer software in
the field of cyber security
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen