Software; Security software; Cyber-attack protection software; Cyber-attack detection software; Software for analysis of information and communication technologies; Cybersecurity software; Computer network security software; Software for detecting, documenting, analyzing, correcting, and blocking cyber threats; Online analysis tools; Computers and computer hardware; Data processing apparatus; Data storage devices; Data collection apparatus; Data communications apparatus; Data communications software; Data communications hardware
Electrical and Scientific ApparatusIntegration of computer systems and networks; Installation, maintenance, repair and servicing of computer software; Cyber security services; Development, design, and implementation of security solutions in the field of cyber security; Software as a service to protect applications and users from cyber attacks; Platform as a service to protect applications and users from cyber attacks; Design, development, and provision of software as an analysis tool online and in computer networks; Analysis of computer systems in the field of cyber security; Computer analysis of security risks in the field of data protection; Computer analyses of information and communication systems; Computer analyses of organizational processes; Proposals for securing information and communication systems; Controlled cyber security services provided through security operation centers; Computer security software management and optimization services for information security and event management, firewall, intrusion detection systems, intrusion prevention systems, network access control, data loss prevention, application security, endpoint security, and forensic and incident response; Cyber incidents detection; Security implementation of information and communication systems; Implementation and operation of cybersecurity systems; Implementation of software for management of records of the computer programs activities and their users; User behavior monitoring; Behavioral analysis and management of access of authorized persons to information and communication systems; Consulting and supervision in the implementation of new information and communication technologies; Consulting and advisory services related to the services included in this class
Computer and Scientific