BOPI 02MQ/2025 DEMANDES DES MARQUES REGIONALES DE PRODUITS ET DE SERVICES SELON L’ACCORD DE BANGUI, ACTE DE 2015 97 platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer Systems and Internet and information networks; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, sccurc mcssaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data Icakagc prévention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for use in implementing cyber security solutions for the Internet of Things (loT); embedded software for use in implementing cyber security solutions for the Internet of Things (loT); software for maintaining cybersecurity for the processing or exchange of information and asset transactions; dow nloadablc cicctronic publications; safety and security apparatus and instruments; security tokens being encryption devices; security software; software for training." (41) "Provision of éducation and training; physical training onsite for protecting assets; arranging and conducting seminars, conférences and workshops in the field of security and cybersecurity technology solutions; information, advice and consultancy provided in relation to ail the aforesaid services." (42) " Cyber security technology solutions, namely, computer security threat analysis for protecting data; détection, monitoring and prévention of security and safety risks, computer security risks, cyberattack privacy risks; researching, designing, developing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer Systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; desk-based risk management consultancy relating to security and cybersecurity threats; computer and intemet security consultancy and data encryption services; provision of computer security threat analysis for protecting data researching, designing, developing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer Systems and Intemet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; researching, designmg, provisiomng, providing, implementing, maintaining and updating software solutions and IT services m the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; network protection services; data leakage prévention services; IT security, protection and restoration services; onsite and remote monitoring of security Systems, computer Systems, computer networks and IT infrastructure for cyber security purposes; cloud-based cyber security services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; software as a service; platform as a service; providing technical reports; technical data analysis; providing online software platforms and software for security, cyber security and
RkJQdWJsaXNoZXIy MTM1NDc3MA==