Computer services, namely, providing identity and access management integration across existing infrastructure and applications; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; IT consulting services; identity and access management consulting services; computer consultation services relating to identity and access management; research in the field of intelligence and security technology; computer software installation and maintenance; computer software development in the field of identity intelligence and user behavior analytics; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others
Computer and Scientific