Computer hardware; Downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices
Electrical and Scientific ApparatusComputer security consultancy; Computer security services, namely, restricting unauthorized access to computer networks and monitored devices; Computer technology consultancy; Computer virus protection services; Computer network security consultancy; Consultation services relating to computer software; Design and development of computer firmware; Development of computer platforms; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software as a service (SAAS) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software design and development; Computer software consultancy; Design and development of computer hardware; Providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices
Computer and Scientific