| Goods and Services | Design and development of computer software; design and development of virtual private network (VPN) operating software; design of computer hardware and software; design and development of network management software; design and development of enterprise network management software and hardware; development of software for secure network operations; computer hardware design; Software ss a Service (SaaS) services featuring software for managing, monitoring, protecting, authenticating, encrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices; data decryption services; data encryption and decoding services; data encryption services; decoding of data services; encryption, decryption and authentication of information, messages and data, namely, data encryption and decoding services and authentication of data in relation to computer, network and data security services in the nature of user authentication services using single sign-on technology for online software applications, electronic signature verification services using technology to authenticate user identity and Authentication, issuance and validation of digital certificates; authentication services of data transmitted via telecommunications, namely, authentication of data in relation to computer, network and data security services in the nature of user authentication services using single sign-on technology for online software applications, electronic signature verification services using technology to authenticate user identity and authentication, issuance and validation of digital certificates; authentication services of data transmitted via telecommunications, namely, authentication of data in the field of computer, network and data security services in the nature of user authentication services using single sign-on technology for online software applications, electronic signature verification services using technology to authenticate user identity and Authentication, issuance and validation of digital certificates; product design of encryption apparatus; product design of data encryption apparatus; product design of data decoding apparatus; product design of data decryption apparatus; IT security, protection and restoration, namely, computer and network security consultancy, data security consultancy, data restoration being recovery of computer data; data security consultancy; data security services, namely, design and development of electronic data security systems, data security consultancy and computer security threat analysis for the protecting data; authentication services for computer security, namely, providing user authentication services for computer networks and systems using multi-factor authentication technology for ensuring data security; providing on-line non-downloadable computer security risk management programs; computer programming services for electronic data security; design and development of electronic data security systems; computer security services for protection against illegal network access, being cybersecurity services in the nature of restricting unauthorized access to computer systems and networks; computer security services in the nature of administering digital certificates; provision of security services for computer networks, computer access and computerised transactions, namely, design and development of electronic data security systems, data security consultancy, computer security threat analysis for protecting data and cybersecurity services in the nature of restricting unauthorized access to computer systems; updating and maintenance of computer software relating to computer security and prevention of computer risks; engineering; research in the field of telecommunications technology; technological research in the field of data security and cybersecurity; computer hardware engineering; software engineering; telecommunication network security consultancy; computer hardware rental; information, advisory and consultancy services relating to all of the aforesaid |
| Goods and Services | Downloadable and recorded software for managing, monitoring, protecting, authenticating, encrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices; downloadable and recorded computer programs for managing, monitoring, protecting, authenticating, encrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices; computer programs, downloadable for managing, configuring, installing, and uninstalling software applications and data; computer software platforms, recorded or downloadable for managing, monitoring, protecting, authenticating, encrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices; downloadable and recorded collaboration software platforms for enabling sharing and communication of data and information; downloadable web application and server software for managing, monitoring, protecting, authenticating, encrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices; downloadable and recorded database server software for controlling and managing access to database servers; downloadable and recorded cloud computing software for managing, monitoring, protecting, authenticating, encrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices; downloadable cloud network monitoring software; cloud servers being computer network servers; downloadable and recorded cloud server software for controlling and managing access to cloud servers; downloadable and recorded computer application software for use in implementing the Internet of Things (IoT); downloadable and recorded network access server operating software; downloadable and recorded privacy protection software for scanning and penetration testing of computers and networks to assess information security vulnerability, restricting unauthorized access to computer systems and data; downloadable and recorded privacy software for encrypting information; downloadable computer software for accessing computer networks; downloadable computer software for accessing databases; downloadable computer software for authorising access to databases; downloadable and recorded computer software for encryption; downloadable and recorded encryption software; downloadable and recorded decryption software; downloadable and recorded security software for scanning and penetration testing of computers and networks to assess information security vulnerability, administering digital keys, restricting unauthorized access to computer systems and data; downloadable and recorded software for network and device security for managing, monitoring, protecting, authenticating, encrypting, decrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices; electronic network security systems comprised of computer hardware and downloadable computer software for the creation of firewalls, downloadable antivirus and antimalware software, downloadable intrusion detection and prevention software, VPN (virtual private network) hardware, downloadable encryption and access control software; downloadable VPN (virtual private network) operating software; computer network hardware; computer networking hardware; data communications hardware, namely, computer network adapters, network servers, computer hardware and peripheral devices and recorded computer software for data communication, encryption and transmitting data sold therewith; ethernet hardware, namely, ethernet controllers and ethernet adapters; ethernet controllers; ethernet switches; LAN (local area network) hardware; VPN (virtual private network) hardware; computer hardware and recorded computer software for use in relation to enabling encrypted network connections; computer hardware and recorded computer software for use in relation to enabling encrypted data connections; WAN (wide area network) hardware; communications servers; security tokens hardware; encryption apparatus, namely electronic encryption units; decryption apparatus being computer hardware; electronic encryption units; data encryption apparatus, namely, electronic encryption units; downloadable data management software; network management apparatus, namely, computers for network management; downloadable and recorded network management software; network management control apparatus, namely, computer hardware for network management; downloadable enterprise software in the nature of a database for non-transactional data and a search engine for database content; downloadable and recorded enterprise application software (EAS) for data security; downloadable enterprise network management software and computer hardware; data loggers and recorders, namely electronic data loggers; downloadable graphical user interface software; communication interface units, namely, computer network interface devices; computer interface apparatus, namely, interfaces for computers; downloadable computer software for use as an application programming interface (API); data-processing apparatus; downloadable and recorded data processing software; data processing systems comprised of data processing apparatus and recorded data processing software; parallel-processing computer hardware; downloadable and recorded computer software that assists computers in deploying parallel applications and performing parallel computations; downloadable and recorded computer software and hardware for use in relation to data security for managing, monitoring, protecting, authenticating, encrypting and securing data, endpoints, computer systems, computer networks, servers, and connected devices |