09
Computer software to be used in the field of security and
risk management; software for encoding and decoding data;
computer software, computer hardware and mobile device
software for detection, blocking, and facilitating removal
and remediation of computer viruses, rootkits, bootkits,
backdoors, zero-day attacks, data exfiltration, phishing,
bots, time bombs, worms, cyber-attacks, malicious attacks,
and advanced persistent threats; computer software for
identifying and preventing malicious attacks on, and
unauthorized activities and intrusions in, computers,
computer systems, networks, hardware, software applications,
digital devices, and mobile devices; computer software and
hardware providing secure networks over virtual computer
systems and virtual computer environments; industrial
firewalls, namely, hardware and embedded software used for
monitoring industrial network security; computer networks
and platforms, comprising computer hardware, computer
network adapters, switches, routers and hubs, and computer
firmware and computer software, for enhancing industrial
automation and for assessing and identifying vulnerabilities
and cyber security threats and risks in control system
infrastructure, computer control systems, networks and
devices, and for testing the effectiveness of cyber security
applications, devices, and systems to achieve optimal
network security, all in the field of cyber security
vulnerability testing and prevention; computer hardware with
embedded software, namely, firmware, and software for
assessing and identifying vulnerabilities and cyber security
threats and risks in control system infrastructure, computer
control systems, networks and devices, and testing the
effectiveness of cyber security applications and devices and
systems to achieve optimal device and network security, in
the field of cyber security vulnerability testing and
prevention of networked devices; computer hardware in the
field of cyber security vulnerability testing and prevention
of networked devices
35
Marketing and advertising in the field of computer forensics
and computer security training; marketing and advertising
relating to the training in the fields of maintenance of
computer software relating to computer security and
prevention of computer risks, provision of security services
for computer networks, computer access and computerised
transactions, updating of computer software relating to
computer security and prevention of computer risks and
computer security system monitoring services; business
accounting and auditing services; commercial screening of
companies and persons; commercial inquiries; secondment of
personnel; consultancy in the fields of business
organisation, business economics and business
administration; business organisation consultancy and
commercial consultancy with regard to security management
systems; consultancy in the fields of commercial risk
management and commercial process management; market
research; management consultancy in the context of security
services; compilation and systemising of information and
data on persons and organisations that can pose a threat to
the democratic legal order or the state security; business
auditing
41
Training in the use and operation of computer software,
hardware, industrial firewalls, computer networks and
platforms all in the field of cyber security; cybersecurity
training services
42
Computer services, namely, designing and implementing cyber
security and privacy requirements and protocols in
information technology systems for others; information
technology consulting services; maintenance of computer
software relating to computer security and prevention of
computer risks; planning, design and implementation of
computer technologies for others; updating of computer
software relating to computer security and prevention of
computer risks; software as a service (SaaS) services
featuring software for use in detecting, reporting,
analyzing and eliminating cyber incidents, namely malware,
unauthorized software and network attacks; software as a
service (SaaS) services featuring software for use in
identification, acquisition, storage, encryption,
management, manipulation, analysis and reporting of security
breach events of computer and computer network data,
metadata, data files, and information; software as a service
(SaaS) services featuring software for use in secure
cross-enterprise data collaboration, workflow auditing and
reporting, data management and sharing, identity management,
access control, and data backup and recovery in the field of
cyber security; computer consultation in the field of
computer security; computer security consultancy in the
field of scanning and penetration testing of computers and
networks to assess information security vulnerability;
scientific and technological services, namely, research and
design in the field of cyber security; consulting services
in the field of cyber security; platform as a service (PaaS)
featuring computer software platforms used for monitoring
industrial network security in the field of cyber security;
consulting services in the field of testing and assessing
networked devices for cyber security vulnerabilities and
risks; computer consultation in the field of cyber security,
namely, providing approvals that minimum security levels
have been achieved in the field of cyber security
vulnerability testing of networked devices; technical
support services, namely, installation, administration, and
troubleshooting of computer software in the field of cyber
security
45
Legal services, security services for the protection of
property and individuals; licensing of computer programs,
hardware, software and intellectual property; copyright
management; professional consultancy (non-business) with
regard to security matters; remote security monitoring
services in the nature of providing real-time threat
assessment, detection, and updates of unlawful activity,
behavioral modelling of network systems for tracking network
security threats, electronic data analytics, namely,
analyzing data in computer databases for unlawful activity,
and generating proactive incident responses in connection
with all of the foregoing
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen