09
Software; downloadable and recorded software; cybersecurity
software; downloadable and recorded software for providing
network, internet, and computer security; downloadable and
recorded software for use in the management, monitoring,
evaluation, optimization, maintenance, recovery, control,
analysis, investigation and security of computer systems,
industrial control systems, and networked devices;
downloadable and recorded software for computer security,
internet security, network security, security monitoring,
network asset identification, threat detection, threat
intelligence, security integration, network architecture,
encryption technology, authentication technology, intrusion
detection and prevention, security and dysfunction incident
remediation, computer security vulnerability assessment,
prioritization, mitigation, and remediation; downloadable
and recorded software for the encryption and authentication
of electronic and digital information and data; downloadable
and recorded computer software for identity security;
downloadable and recorded software for authentication and
identity management information security; downloadable and
recorded software for automating a process for
authentication of identity using existing databases in
connection with the issuance and management of digital
certificates used for authentication or encryption of
digital communications, or authentication of a digital
signature in an electronic transaction or communication,
over the internet and other computer networks; downloadable
and recorded software for providing data analytics, business
analytics, business intelligence and for collecting and
analyzing data; downloadable electronic data files featuring
data for computer security, internet security, network
security, security monitoring, network asset identification,
threat detection, threat intelligence, security integration,
network architecture, encryption technology, authentication
technology, intrusion detection and prevention, security and
dysfunction incident remediation; computer hardware; optical
and image sensor hardware; computer hardware for use in
management, monitoring, evaluation, analysis, investigation
and security of computer systems, industrial control
systems, and networked devices; sensors for use in
management, monitoring, evaluation, analysis, investigation
and security of computer systems, industrial control
systems, and networked devices
41
Educational services; educational services in the field of
cybersecurity; training services in the field of
cybersecurity; providing online, non-downloadable
educational publications, articles, webinars, whitepapers,
solution briefs, reports, and datasheets in the field of
cybersecurity
42
Software as a service (saas) services; platform as a service
(paas) services; software as a service (saas) services
featuring cybersecurity software; platform as a service
(paas) services featuring cybersecurity software;
non-downloadable software for providing network, internet,
and computer security (terms too vague in the opinion of the
International Bureau – Rule 13 (2) (b) of the Regulations);
non-downloadable software for use in management, monitoring,
evaluation, optimization, maintenance, recovery, control,
analysis, investigation and security of computer systems,
industrial control systems, and networked devices (terms too
vague in the opinion of the International Bureau – Rule 13
(2) (b) of the Regulations); non-downloadable software for
computer security, internet security, network security,
security monitoring, network asset identification, threat
detection, threat intelligence, security integration,
network architecture, encryption technology, authentication
technology, intrusion detection and prevention security and
dysfunction incident remediation, computer security
vulnerability assessment, prioritization, mitigation, and
remediation (terms too vague in the opinion of the
International Bureau – Rule 13 (2) (b) of the Regulations);
non-downloadable software for the encryption and
authentication of electronic and digital information and
data (terms too vague in the opinion of the International
Bureau – Rule 13 (2) (b) of the Regulations);
non-downloadable software for identity security (terms too
vague in the opinion of the International Bureau – Rule 13
(2) (b) of the Regulations); non-downloadable software for
authentication and identity management information security
(terms too vague in the opinion of the International Bureau
– Rule 13 (2) (b) of the Regulations); non-downloadable
software for automating a process for authentication of
identity using existing databases in connection with the
issuance and management of digital certificates used for
authentication or encryption of digital communications, or
authentication of a digital signature in an electronic
transaction or communication, over the internet and other
computer networks (terms too vague in the opinion of the
International Bureau – Rule 13 (2) (b) of the Regulations);
non-downloadable software for providing data analytics,
business analytics, business intelligence and for collecting
and analyzing data (terms too vague in the opinion of the
International Bureau – Rule 13 (2) (b) of the Regulations);
providing an online portal for use in management,
monitoring, evaluation, optimization, maintenance, recovery,
control, analysis, investigation and security of computer
systems, industrial control systems, and networked devices
(terms too vague in the opinion of the International Bureau
– Rule 13 (2) (b) of the Regulations); providing an online
portal for computer security, internet security, network
security, security monitoring, network asset identification,
threat detection, threat intelligence, security integration,
network architecture, encryption technology, authentication
technology, intrusion detection and prevention, security and
dysfunction incident remediation (terms too vague in the
opinion of the International Bureau – Rule 13 (2) (b) of the
Regulations); electronic storage of data; information
technology consulting services; consulting services in the
field of cybersecurity; consulting services in the field of
management, monitoring, evaluation, control, analysis,
investigation and security of computer systems, industrial
control systems, and networked devices; providing
information concerning the encryption and authentication of
electronic and digital data; authentication, issuance and
validation of digital certificates; issuance and management
of digital certificates for authentication or encryption of
a digital communication, or authentication of a digital
signature in an electronic transaction or communication,
over the internet and other computer networks; design,
development, installation, and customization of software;
design and development of cybersecurity systems;
development, design, implementation, testing, analysis, and
consulting services in the field of security, access,
authorization, authentication encryption, and identification
systems for computers, computer hardware and computer
networks; updating of computer software; computer diagnostic
services; technical support services; technical support
services in the nature of monitoring, detecting, diagnosing,
remediating, mitigating and resolving cybersecurity issues;
technical support services in the nature of architecture
reviews, vulnerability assessments, device and application
penetration tests, network penetration tests, and threat
hunting for of computer systems, industrial control systems,
and networked devices
45
Monitoring services (terms too vague in the opinion of the
International Bureau – Rule 13 (2) (b) of the Regulations);
monitoring of computer systems, industrial control systems,
and networked devices for security purposes; monitoring and
tracking of security vulnerabilities and problems in
computer software products and computer networks;
investigation services (terms too vague in the opinion of
the International Bureau – Rule 13 (2) (b) of the
Regulations); investigation of security threats to computer
systems, industrial control systems, and networked devices
for security purposes; investigation of security
vulnerabilities and problems in computer systems, industrial
control systems, and networked devices for security
purposes; computer emergency response team services, namely,
monitoring, tracking, and investigation of security
vulnerabilities and problems in computer software products
and computer networks
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen