42 Development, programming, implementation, maintenance and updating of software; development of software for communication systems; design and development of software in the field of mobile applications; development of software for converting data from different protocols and into different protocols; computer software design; design of software for embedded devices; software creation; software engineering; software customisation services; installation of computer software; computer software consultancy; rental of computer software for use in securing computer networks; software engineering services for data processing programs; updating of data in computer software databases; custom design of software packages; computer software technical support services, namely, help desk services; rental of software for internet access; maintenance of software for computer records; configuration of computer networks by software; maintenance of software for communication systems; updating of software for communication systems; consultancy relating to software for communication systems; software as a service (SaaS) featuring software for use service desk management; implementation of software; computer security consulting and computer network security consulting; monitoring services for computer security systems, in particular computer security services for protection against illegal network access; updating of software for embedded devices, in particular devices embedded in mobile devices; installation of internet access software; installation and maintenance of internet access software; consultancy in relation to software, in particular in relation to software for securing terminals, servers, data networks and the use of the internet; maintenance and updating of software for communication systems; installation, repair and maintenance of computer software; installation, maintenance and repair of software for computer systems; consultancy services relating to computer networks using mixed software environments; consultancy and advice in the field of computer software; design of software for data and multimedia content conversion from and to different protocols; providing temporary use of non-downloadable software to enable sharing of multimedia content and comments among users; IT services, namely, technology consultation in the field of managed cyber security services; IT services, namely, technology consultation in the field of endpoint security management; computer security consultancy in the field of scanning and testing of computers and networks to assess information security vulnerability and providing reports concerning assessed vulnerabilities; computer security consultancy services regarding the removal of weaknesses and security gaps in computers, computer systems and mobile devices to minimize the risks of cyber attacks; permanent monitoring of computer systems and mobile devices to detect unauthorized access or data breach to minimize the risk of cyber attacks; providing computer security information via text messages; IT services, namely, providing monitoring of computer systems for endpoint detection and restriction of unauthorized access; application service provider, namely, managing the computer software and hardware of others; computer services, namely, on-line scanning of computers and computer networks to create a list of software and hardware assets in the network and find outdated software, non-compliant software, misconfigurations, open ports, malware and phishing software, and identify computer security vulnerabilities from shadow IT systems and unsafe partner companies; computer security consultancy in the nature of executing assessment scans to find weak points in software and hardware assets; updating of computer software relating to computer security and prevention of computer risks; application service provider (ASP), namely, hosting computer software applications of others; computer support services, namely, maintenance services for security software; consultation in the field of information security services for computer networks; computer services, namely, scanning services to identify information security vulnerabilities; monitoring and assessing the information security risks of computer networks and websites; computer security services for protection against illegal network access; computer security consulting in the nature of implementing and updating software solutions and IT services in the field of cybersecurity, including scanning and managing network vulnerabilities, detecting and reacting to cyber threats and attacks; computer security consulting in the field of cybersecurity, including security and protection for pc, laptop, mobile devices, servers, cloud, network and internet use, data security and protection, antivirus protection, theft protection, backup, secure messaging, email security, safe browsing, software updates and management of remote-controlled devices; personal data security consultancy; digital compression of computer data for the purpose of data loss prevention; computer services, namely, public cloud hosting provider service; computer services, namely, cloud hosting provider services; application service provider featuring application programming interface (API) software; computer services, namely, private cloud hosting provider service; outsource service providers in the field of information technology consulting