Goods and Services | Computer software, firmware and hardware for searching, mining, collecting, analyzing, viewing, processing, storing, managing, monitoring, aggregating and modeling data; computer software, firmware and hardware for searching for, identifying, viewing, analyzing, processing, storing, managing, monitoring, aggregating and modeling transactions; computer software, firmware and hardware for searching, exploring, identifying, viewing, analyzing, processing, storing, managing, monitoring, aggregating and modeling patterns and networks in data; computer software, firmware and hardware for detecting suspicious behavior, namely, detecting patterns and networks in data which indicate that financial crime, fraud or terrorism have occurred or are likely to occur; computer software, firmware and hardware for analyzing and predicting customer behavior in the field of finance, namely, banking and insurance; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for information technology and communications technology security purposes; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analyzing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in defence, law enforcement, and business process optimisation; data processing apparatus and instruments; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behavior on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analyzing, sharing, processing, managing, filtering, storing, monitoring and transmitting data; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analyzing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data, of information, and of electronic communications; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data, information and electronic communications; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software, firmware and hardware for gathering intelligence and evidence in the fields of financial crime, fraud, terrorism and homeland security; computer software, firmware and hardware for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; downloadable electronic publications in the nature of brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, all in the fields of computer science, information technology, communications technology, financial crime, crime and fraud detection and prevention, cyber security, homeland security and terrorism prevention |
Goods and Services | Information technology consultancy services; research and development of computer software; design and development of computer software and computer hardware; computer network design for others; computer monitoring service with tracks computer hardware performance and processes and sends out historical reports and alerts; computer monitoring service with tracks application software, performs periodic maintenance and provides reports and alerts concerning such performance; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software for searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modeling, viewing, sharing and monitoring of data and transactions, including patterns and networks in data and transaction; software as a service (SAAS) services featuring software for the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behavior, terrorism operations, smuggling operations, money laundering operations and monetary losses; software as a service (SAAS) services featuring software for identifying, investigating, reviewing and managing cases of financial crime of all types; software as a service (SAAS) services featuring software for predictive modeling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; software as a service (SAAS) services featuring software for due diligence investigations on customers and potential customers; software as a service (SAAS) services featuring software for the analysis and prediction of customer behavior; computer services, namely, computer system administration for others; computer systems analysis; computer forensic services, namely, forensic analysis of computer operating systems; software as a service (SAAS) services featuring software for matching, transforming, sampling, partitioning and analysis of data;advanced product research in the field of artificial intelligence; computer project management services; computer virus, malware and spyware protection services; recovery of computer data; geographic mapping; computer modeling services, namely, computer simulation from computer programs for others; computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring software forcountering of improvised explosive devices (IEDs), including minefield clearance |