42 Scientific and technological services, namely, development of security systems, contingency planning for information and telecommunications technology systems; research and industrial analysis in the fields of information and telecommunications technology concerning computer hardware, computer software, IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; design of computer hardware, computer software and computer peripheral devices in the fields of information technology (IT), IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; engineering in the fields of information and telecommunications technology concerning computer hardware, computer software, information technology (IT), IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; technical consultancy in the fields of information and telecommunications technology concerning computer hardware, computer software, information technology (IT), IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; technical surveys, namely, conducting engineering surveys; technical project studies, namely, conducting feasibility studies in the fields of information and telecommunications technology; technical project management in the fields of information and telecommunications technology; technical evaluations, namely, engineering evaluation services; services of a physicist, namely, physics research and consulting; services of a software engineer, namely, software engineering; security consulting, in particular in the fields of computer security threats and vulnerabilities, computer technical architecture, computer programs and computer project management; computer security consulting, in particular in the fields of design, configuration and deployment of computer networks, and audits and risk assessments of computers and networks to assess information security vulnerability; computer software consultancy; consultancy in the field of design and development of computer hardware; computer system design; computer software design; computer programming; computer virus and intrusion protection services using computer programming; computer systems analysis; recovery of computer data; design, development, installation, configuration, updating, implementation, integration, maintenance, and modification of computer software, computer software updates, downloadable computer software, database systems, computer operating software systems and computer software networks; design, development and configuration of computer hardware; cloud deployment services, namely, providing virtual computer systems and virtual computer environments though cloud computing; computer software and hardware technical support services, including via hotline or telephone, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; managed security services, namely, remote computer backup services in the fields of computer hardware, computer software, computer software updates, downloadable computer software, databases, computer operation systems, computer and telecommunication networks, IT-platforms, IT-infrastructures; off-site data backup services; electronic data storage services; technical administration of access to computer networks, namely, computer security services in the nature of restricting access to computer networks by undesired web sites, media and individuals and facilities; provision of technical security directives, namely, computer security consultancy; information technology consulting services, namely, inspection of information technology guidelines and processes; all of the aforementioned services in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content and managed perimeter infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems