41
Training and education services relating to computer and
computer network security services; training and education
services relating to computer intrusion, detection,
prevention and countermeasures; education and training
relating to the assessment of information security and /
vulnerability; training and education services for network
and / or website administrators; training and education
services relating to telecommunications security; organising
competitions and events relating to computer hardware,
software and firmware and / or telecommunications hardware,
software and firmware
42
Computer services, namely, consultation in the field of
computer hacker countermeasures; providing network
penetration testing, address spoofing and analysis of
computer networks and software programs for security risks
and vulnerability; computer security consultancy in the
field of scanning and penetration testing of computers and
networks to assess information security vulnerability;
analysis of telecommunications networks and telecoms
software / hardware for security risks and vulnerability;
testing of data security practices and procedures for
compliance with best practice; computer security
consultancy; computer security system monitoring services;
authentication and certification services for computer
security; provision of security services for computer
networks, computer access and computerised transactions;
updating of computer software relating to computer security
and prevention of computer risks; maintenance of computer
software relating to computer security and prevention of
computer risks; monitoring of computer systems for security
purposes; provision of computer security risk management
programs; computer security threat analysis for protecting
data; computer programming services for electronic data
security; computer security services for protection against
illegal network access; computer security services in the
nature of administering digital certificates; managed
computer server centres; information technology (IT)
services; computer programming; cloud computing services;
computer services, namely, cloud hosting provider services;
hosting of digital content on the Internet; cloud hosting of
electronic databases and virtual computing environments;
server hosting; computer time-sharing services; providing
virtual computer systems and virtual computer environments
through cloud computing; computer services, namely,
providing virtual application, web, file, database and
storage servers of variable capacity to others; scaling
services, namely, providing variable computing and
electronic storage capacity to others; administering and
maintaining databases and virtual computing environments for
others; application service provider (asp), namely, hosting
computer software applications and databases of others;
computer services, namely, hosting, managing, provisioning,
scaling, administering, maintaining, monitoring, securing,
encrypting, decrypting, replicating and backing up databases
and cloud computing environments for others; data
warehousing; technical support services, namely,
troubleshooting of computer software problems; computer
services, namely, monitoring the web sites of others to
improve their scalability and performance; computer
services, namely, enforcing, restricting and controlling
access privileges of users of computing and network
resources based on assigned credentials; software as a
service (SaaS) featuring software for managing and deploying
virtual machines to a cloud computing platform; software as
a service (SaaS) featuring software for running cloud
computing based applications; software as a service (SaaS)
featuring software platforms for cloud computing networks
and applications; software as a service (SaaS) featuring
software that provides access to cloud-based scalable
computing resources and data storage; software as a service
(SaaS) featuring software for monitoring cloud and
application performance; software as a service (SaaS)
featuring software for event logging, reporting, analysis
and alert generation; software as a service (SaaS) featuring
software for collecting, editing, modifying, organizing,
synchronizing, integrating, monitoring, transmitting,
storage and sharing of data and information; software as a
service (SaaS) featuring software for data, desktop and
application streaming; software as a service (SaaS)
featuring software for data backup, recovery and archiving;
software as a service (SaaS) featuring software for data
transfer and migration; software as a service (SaaS)
featuring software for data protection and data security;
software as a service (SaaS) featuring software for data
warehousing; software as a service (SaaS) featuring database
management software; software as a service (SaaS) featuring
software for creating, configuring, provisioning and scaling
databases; software as a service (SaaS) featuring software
for storing, retrieving, caching, extracting, formatting,
structuring, systematizing, organizing, indexing,
processing, querying, analyzing, replicating and controlling
access to data; software as a service (SaaS) featuring
software for logging changes within a database; software as
a service (SaaS) featuring software for improving database
performance; software as a service (SaaS) featuring software
for configuring, provisioning and scaling data cache storage
for databases; software as a service (SaaS) featuring
software for computer network management and automation;
software as a service (SaaS) featuring software for
monitoring, tracking, logging and analyzing computer network
events, user activity, changes to resource activity and
security statistics; software as a service (SaaS) featuring
network security software; software as a service (SaaS)
featuring network threat detection software; software as a
service (SaaS) featuring network access management and
monitoring software