9 Computer software for use in the detection of Internet threats, Internet espionage and Internet attacks, for use in carrying out security checks on computer networks, for use in identifying security vulnerabilities within computer networks, for use in responding to and recovering from Internet attacks, and for use in managing data; computer hardware; electronic and software sensors to identify malicious behavior within enterprises; computer software for analyzing, viewing, sharing, processing and monitoring patterns and networks in data; computer software to collect, view, share, process, store and exploit data and electronic communications;computer software for network and data security; electronic and software instruments for intrusion alert; computer fire walls; computer software for real-time situational awareness and workflow management; apparatus and instruments for the acquisition, input, output, storage, processing, transmission, display and printing of data