Computer hardware and recorded software for evaluating devices, namely, testing, assessing, and diagnosing computer hardware, computer peripherals, information and communications technology devices, BIOS, operating systems, and networks for cybersecurity vulnerabilities, threat detection, and supply chain risk assessment, sold as a unit; multidimensional imaging and scanning apparatus for evaluating devices, namely, itemizing and assessing components in computer hardware, computer peripherals, information and communications technology devices for anomalies; computer and network hardware and peripheral devices, namely, computer servers, laptops, cables, routers, network switches, firewalls, and specialized telecommunications devices and equipment; computer software for threat intelligence with customizable report generation, namely, denied party screening and other sanctioned-entity and corporate violator reporting
Electrical and Scientific ApparatusComputer hardware design and development consultancy services; computer security consultancy in the field of scanning and penetration testing of computer hardware, computer peripherals, information and communications technology devices, BIOS, operating systems, and networks to assess information security vulnerability; inspection services, namely, evaluation of computer hardware and computer peripherals for counterfeits and performance anomalies; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generating and delivery of threat reports; computer security consultation services in the field of cybersecurity, namely, deception network services for monitoring and protecting computer networks for others, providing cyber security and information security diligence and solutions for others, collecting and aggregating cybersecurity data and intelligence; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware, computer peripherals, information and communications technology devices for problems for cybersecurity systems of others; consulting services in the fields of security and vulnerability of computers, computer systems, networks, and related hardware; computer services in the nature of detecting and diagnosing computer hardware, computer peripherals, and information and communications technology devices for security problems and vulnerabilities; computer security consultancy in the field of malware, intrusion and penetration testing, assessing, and diagnosing of computers and networks to assess information technology security and vulnerability; compliance and vulnerability assessments, namely, providing security consultancy in the field of scanning and penetration testing of computer hardware, computer peripherals, information and communications technology devices to assess information security vulnerability; security compliance and vulnerability assessments, namely, technical verification and validation of computer hardware, computer peripherals, information and communications technology devices for others; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generation and delivery of a threat score; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generation and delivery of a threat status; managed secure services and other technical consulting services in the field of cybersecurity for evaluating devices for potential sabotage or unauthorized access risks; computer services in the nature of electronic imaging, detecting, and diagnosing computer hardware, computer peripherals, information and communications technology devices for security problems and vulnerabilities; computer network security services; computer network defense services, namely, providing firewall and related protections from viruses, infiltration, and malware; threat intelligence services, namely, threat identification, reporting, and data aggregation, namely, denied party screening and other sanctioned-entity and corporate violator reporting.
Computer and Scientific