Computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; computers and computer hardware; operating software in the nature of computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; computer operating software; downloadable computer software for monitoring and analysis, namely, for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware; computer software for use in monitoring use of computers for security purposes; computer software for use in accessing databases on the global computer network; computer software for the detection and removal of computer viruses and threats; computer software for encrypting and authenticating data; computer software for detecting and repairing computer software and hardware problems; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; computer optimization software for the protection and running of computer hardware
Electrical and Scientific ApparatusCyber insurance analysis, namely, review of insurance policies; consulting services in the field of risk-management, namely, providing review of cyber insurance for online hacking, data breach, and network security; consulting services in the field of cyber insurance, namely, review of insurance policies; providing consultancy services in the field of cyber insurance policies
Insurance and FinancialComputer software development, design, and implementation services in the field of security for computers and computer networks; computer systems analysis in the field of security for computers and computer networks; computer consultation regarding computer networks and internal computer networks and security services for computer networks and internal computer networks, namely, installation, design and customization; computer consulting services in the field of security integration, network security, encryption technology, and computer security; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer programming of internet security programs; design and development of computer software programs for Internet security; computer software research; computer software installation; computer software design; computer software development; computer software consultancy services; data security services, namely, design and development of internet security software and electronic data security systems; design and development of electronic data security systems; updating of computer software relating to computer security and prevention of computer risks and risk management; maintenance of computer software relating to computer security and prevention of computer risks and risk management; development of technologies, namely, computer software development for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for the protection of electronic networks; legal support and litigation support services, namely, technical assistance in the legal prosecution of malicious conduct by providing technical information and technical advisory services related to computer software, computer networks, computer and data security, network security, computer security integration, and encryption technology
Computer and ScientificMonitoring of computer and network systems and the internet for security and risk assessment purposes; electronic monitoring services for security purposes in the field of computer and internet services; provision of information, advisory, and consultancy services, all relating to the aforesaid including such services provided on line or via the internet
Personal