Class 035: Business consulting services in the fields of cyber security, computer security, IT security, security software, computer security vulnerabilities, and internet security; Class 042: Computer security consultancy; Technology consultation in the field of Cyber security; Data security consultancy; IT Consultation services in the field of cyber security risk management; Consulting services in the fields of information technology and computer security regarding selection, development, and use of security products, computer hardware, and software; Consulting services in the fields of cyber security, computer security, IT security, security software, computer security vulnerabilities, and internet security; Computer security risk assessment and threat analysis for protecting data; Managing cyber security services for others, namely, updating and maintenance of computer software relating to computer security and prevention of computer risks; Maintaining computer software for others relating to cyber security and prevention of computer risks; Technical design, implementation and support services, namely, monitoring of computer systems for detecting unauthorized access or data breach and reporting cyber security events for others; Reporting cyber security events and data breaches for others
Class 035: Business consulting services in the fields of cyber security, computer security, IT security, security software, computer security vulnerabilities, and internet security; Class 042: Computer security consultancy; Technology consultation in the field of Cyber security; Data security consultancy; IT Consultation services in the field of cyber security risk management; Consulting services in the fields of information technology and computer security regarding selection, development, and use of security products, computer hardware, and software; Consulting services in the fields of cyber security, computer security, IT security, security software, computer security vulnerabilities, and internet security; Computer security risk assessment and threat analysis for protecting data; Managing cyber security services for others, namely, updating and maintenance of computer software relating to computer security and prevention of computer risks; Maintaining computer software for others relating to cyber security and prevention of computer risks; Technical design, implementation and support services, namely, monitoring of computer systems for detecting unauthorized access or data breach and reporting cyber security events for others; Reporting cyber security events and data breaches for others
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.