09
Downloadable software for software, firmware, and hardware
security; downloadable software for detecting and preventing
hardware, software, and firmware vulnerabilities;
downloadable software providing a hardware security
verification framework; downloadable software for preventing
unauthorized access to proprietary or confidential data;
downloadable software for ensuring compliance with hardware
security policies; downloadable software for generating
reports on software, firmware, and hardware security
vulnerabilities; downloadable software, namely, a hardware
security platform for testing, detecting, and preventing
hardware security vulnerabilities; downloadable software
providing security validation for computer hardware designs;
downloadable software for detecting hardware security
vulnerabilities resulting from architecture,
implementations, software configuration errors, or firmware
configuration errors
35
Business consultation services in the fields of hardware
security policy compliance and vulnerability detection;
business consultation in the field of risk management,
cybersecurity and security; business risk assessment and
management services; business services, namely, formulation
of best practices for hardware cybersecurity; preparation of
business security reports; promoting the use of the security
assurance best practices of others in the field computer
hardware, software, and firmware design
42
Computer security consultancy in the field of software,
firmware, and hardware security testing; cybersecurity
services in the nature of restricting unauthorized access to
computer systems; cybersecurity services in the nature of
software, firmware, and hardware security testing;
cybersecurity services in the nature of independent hardware
cybersecurity assessments; cybersecurity hardware compliance
and assessment services; technological planning and
consulting services in the field of hardware, software, and
firmware security; technical support services, namely,
troubleshooting in the nature of diagnosing computer
hardware and software security