Description
[Class : 9] Computer Software And Hardware For Digital Security, Cyber Security, Internet Security, Data Security And Network Security; Computer Security Products, Namely, Computer Peripherals; Computer Software And Computer Hardware For Detection, Blocking, Monitoring, Filtering, Reporting And Facilitating Removal And Remediation Of Computer Viruses, Rootkits, Bootkits, Backdoors, Zero Day Attacks, Data Exfiltration, Phishing, Bots, Time Bombs, Worms, Cyber Attacks, Malicious Attacks, Advanced Persistent Threats, Network Traffic, Malware, Spyware, Unauthorized Software And Network Attacks, And Preventing Intrusion Into Computer Networks, Web Sites, And Other Computer Systems And Related Computer Hardware And For Security, Configuration Auditing, And Vulnerability Scanning Of Computer Networks; Data Processing Apparatus And/Or Instruments, Adapted For Use In Independently Verifying And Validating The Authenticity Of Websites; Security Encryption Software For Use In The Secure Transmission Of Digital Information; Software, Namely, Protocol Conversion Software For Translating Messages And/Or Information Between Telecommunications Protocols And/Or Languages.[Class : 42] Design, Development, Implementation, Updating And Strategic Planning Services Of Computer Software For Digital Security, Cyber Security, Cyber Risk Management; Data Breach Response And Crisis Management; Internet Security, Data Security And Network Security; Assessment Of, And Analytical Services Relating To, Digital Security, Cyber Security, Cyber Risk Management, Data Breach Response And Crisis Management, Internet Security, Data Security And Network Security; Compliance Auditing, Assessment And Reporting, In Relation To Digital Security, Cyber Security, Cyber Risk Management, Data Breach Response And Crisis Management, Internet Security, Data Security And Network Security; Computer Systems Analysis; Technical Support, Advice And Consulting Services Related To Security And Vulnerability To Cyber Attacks And Threats Against Computers, Computer Systems, Networks, Hardware, Software Applications, Digital Devices, Digital Data, And Mobile Devices; Cloud Computing Services Utilising Software And Databases For Use In Computer Security And Prevention, And The Mitigation Of Cyber Risks; Consultation And Research In The Field Of Network Security; Application Service Provider (Asp) Featuring Software For Use For Detection, Blocking, And Facilitating Removal And Remediation Of Computer Viruses, Rootkits, Advanced Persistent Threats, Malware And Malicious Attacks In Computers, Computer Systems, Networks, Hardware, Software Applications, Digital Devices, And Mobile Digital Devices; Installation And Maintenance Of Computer Software, In Relation To Internet Security; Computer Database Management Services; Web Hosting Services; Computer Services, Namely, Secure Online Website Authentication Identification Software Subscription Services For Website Proprietors Allowing Internet Users To Check The Online Identification Of Website Proprietors In Real Time; Research, Development, Integration And Operation Of Computer Systems Supporting The Issuance And Management Of Digital Secure Online Website Authentication Verification, And The Creation And Implementation Of Procedures And Practices For The Issuance And Management Of Digital Online Website Authentication Verification.