35
Risk management consultancy [business]; advisory services
relating to business risk management; business risk
assessment services; business risk management services
42
Consulting in the field of cloud computing networks and
applications; consulting services in the field of cloud
computing; consulting services in the field of software as a
service [saas]; consulting services relating to computer
software; computer technology consultancy; computer software
consulting; computer software consulting services; control
technology consulting services; information technology [it]
consulting services; information technology consulting;
information technology consulting services; authentication
services for computer security; computer security
consultancy; computer security services for protection
against illegal network access; computer security services
in the nature of administering digital certificates;
computer security system monitoring services; computer
security threat analysis for protecting data; consultancy in
the field of computer security; consultancy in the field of
data security; consultancy in the field of security
software; data security consultancy; data security services;
data security services [firewalls]; design and development
of internet security programs; design and development of
electronic data security systems; it security services in
the nature of protection and recovery of computer data;
maintenance of computer software relating to computer
security and prevention of computer risks; monitoring of
computer systems for security purposes; professional
consultancy relating to computer security; programming of
internet security programs; provision of computer security
risk management programs; provision of security services for
computer networks, computer access and computerised
transactions; maintenance of computer software relating to
computer security and prevention of computer risks;
provision of computer security risk management programs;
updating of computer software relating to computer security
and prevention of computer risks; computer security services
for protection against illegal network access; hosting of
access control as a service (acaas) servers and software;
installation and maintenance of internet access software;
installation of internet access software; maintenance of
software for internet access; monitoring of computer systems
by remote access; monitoring of computer systems for
detecting unauthorized access or data breach; provision of
security services for computer networks, computer access and
computerised transactions; access control as a service
(acaas); certification of data via blockchain; data
authentication via blockchain; data storage via blockchain
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen