Goods and Services | Downloadable software for mobile telephones and touchscreen tablets and apparatus with multimedia and interactive functions; software packages, namely, downloadable computer software for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; recorded computer operating programs and downloadable databases in the field of cybersecurity; downloadable computer using artificial intelligence software for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; artificial intelligence software for monitoring in the field of cybersecurity; downloadable security software for ensuring the security of computer systems and electronic devices against cyberattacks and other cybersecurity threats; downloadable software for computer network security and computer central processing units; downloadable computer network threat detection software; downloadable software for detecting threats against computer networks; computer software platforms for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats in the form of recorded and or downloadable software; recorded computer software for database management software; downloadable computer for information management in the field of cybersecurity software; recorded computer operating programs; apparatus for recording, transmission, processing and reproduction of sounds, images or data; computer hardware for data upload, download, transmission and storage; apparatus for processing, transmission and storage of database information in the field of cybersecurity; computer data storage devices, namely, high-speed storage subsystems for storage and backup of electronic data either locally or via a telecommunications network; apparatus for sound and images transmission, reproduction and processing media; blank USB flash drives; electronic agendas; downloadable electronic publications in the nature of manuals, guides, newsletters, and reports in the field of cybersecurity; downloadable electronic databases in the field of cybersecurity; downloadable electronic data banks, namely, databases in the field of cybersecurity; all the aforesaid goods relating to cybersecurity and excluding games, video games and computer games |
Goods and Services | Evaluations, assessments and research in the fields of artificial intelligence science and technology provided by engineers; research and development of new products and services for others; conducting of technical feasibility project study in the field of new technologies; consultancy, advisory, information and technical support services with respect to information technology relating to installation, maintenance and repair of computer software; consultancy, advisory, information and technical support services with respect to telecommunications network security; IT consultation, advice, information and support services relating to installation, maintenance and repair of computer software; consultancy, advisory, information and technical support services with respect to computer software systems for others; consultancy, advisory, information and technical support services with respect to computer security; consultancy, advisory and information services with respect to the design and development of computer programs; expert consultancy, advisory, information and technical support services with respect to the design and development of computer hardware equipment; consultancy, advisory and information services with respect to the design and development of computer hardware; design and development of computers hardware; consultation with respect to computers hardware; recovery of computer data; computer data recovery service in the event of computer damage; consultancy, advisory, information and technical support services with respect to computer data recovery; computer programming; computer diagnostic services; expertise consulting services with respect to information technology relating to installation, maintenance and repair of computer software; computer system design; computer system analysis; advisory services in the field of computer system analysis; Consultancy of information technology data security, protection and restoration; computer security threat analysis for protecting data; analysis of computer security threats for data protection; computer system monitoring operation services by remote access; monitoring computer systems for security purposes, namely, detecting unauthorized access or data breach; monitoring of computer systems to detect breakdowns; monitoring services for technological functions of computer security systems; computer security threat analysis services for data protection; monitoring of computer systems for the detection of unauthorized access or data protection breaches; electronic monitoring of personal identification information for the detection of identity theft via the Internet; electronic monitoring of credit card transactions for the detection of fraud via the Internet; computer firewall services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; computer virus protection services; computer security services for protection against unauthorized computer network access; providing user authentication services for computer security using block chain technology for online software applications; computer software troubleshooting; repair of damaged computer programs; design, development, installation, maintenance, updating and rental of computer software applications for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; Software as a Service (SaaS) featuring software for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; artificial intelligence software as a service (AIAAS) services featuring software using artificial intelligence (AI) for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; platform as a service (PaaS) featuring computer software platforms for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; artificial intelligence platforms being software as a service services featuring software using artificial intelligence (AI) for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; technical support services in the field of software as a service (SaaS) services, namely, troubleshooting computer software problems; Infrastructure as a Service (IaaS) services, namely, hosting software for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats for use by others; providing online non-downloadable software development tools for creating blockchain-based applications provided by a Blockchain as a Service (BaaS) provider; cloud computing featuring software for use in monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; providing temporary use of online nondownloadable software for monitoring, detecting, reporting, responding to, and protecting against cyberattacks, malware, and other cybersecurity threats; providing online temporary access and use of nondownloadable cloud-based operating software for computers and Internet-connected electronic devices; providing temporary use of online non-downloadable cloud computing software using artificial intelligence for computer programs on data networks; research with respect to computer software security; conversion of computer programs and data, other than physical conversion; conversion of data or documents from physical to electronic media; electronic data storage; all the aforementioned services relating to cybersecurity and excluding games, video games and computer games |