Recorded interactive software for providing cybersecurity services; Recorded interactive software for providing defense services; Downloadable computer software for authorising access to databases; Downloadable computer software and firmware for authenticating user identification; Satellite communications apparatus; Satellite transceivers; Downloadable computer software using artificial intelligence (AI) for use in software development, machine learning, facial and speech recognition in the field of cybersecurity and defense; Recorded computer software using artificial intelligence (AI) for use in software development, machine learning, facial and speech recognition, in the field of cybersecurity and defense; Infrared detectors for use in military, law enforcement, civil, scientific and industrial applications; Laser detectors for targets; Laser range finders; Gun scopes; Telescopic sights; Telescopic gun sights; Lasers for non-medical purposes; Downloadable computer application software for mobile phones, namely, software for providing cybersecurity; Downloadable computer application software for mobile phones, namely, software for providing defense services; Downloadable computer application software for computers, namely, software for providing cybersecurity; Downloadable computer application software for computers, namely, software for providing defense services
Electrical and Scientific ApparatusComputer software design and development; Computer software applications design and development; Computer software design services; Technological planning and consulting services in the field of cybersecurity and defense software; Computer security threat analysis for protecting data; Software as a service (SAAS) services featuring software for cybersecurity, namely, for detecting, preventing, and responding to cyber threats; Electronic storage of digital audio files; Platform as a service (PAAS) featuring computer software platforms for transmission of images, audio-visual content, video content and messages in relation to cybersecurity and defense; Computer security consultancy; Internet security consultancy; Computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites; Computer security services, namely, restricting unauthorized network access by users without credentials; Telecommunication network security consultancy; Design and development of artificial intelligence (AI) software; Providing online non-downloadable software using artificial intelligence (AI) for machine learning
Computer and Scientific