Reseller services, namely, distributorship services in the field of computer and data security software; procurement services in the form of purchasing computer hardware and software for others; purchasing, procurement and sourcing services, namely, procuring and sourcing computers, computer hardware, computer software and components for electronic data storage centers for others; consulting services in the field of procuring and sourcing computers, computer hardware, computer software, and components for electronic data storage centers
Advertising and BusinessTechnical support services, namely, troubleshooting in the nature of repair of computer network
Building Construction and RepairTelecommunication services, namely, providing electronic message alerts via the internet notifying individuals of a changed status or condition of a sensing device in a security system as a response to computer security incidents
TelecommunicationsMonitoring of computer systems to detect cybersecurity incidents; Monitoring of computer systems for detecting unauthorized access or data breach; computer security threat analysis for protecting data; Computer security consultancy; Computer network security consultancy in the field of software and network security research; Computer services, namely, remote management of the information technology (IT) systems of others; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Technical support services, namely, technical advice relating to antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering, and/or intrusion detection and prevention; Troubleshooting of software and hardware problems and monitoring network systems; Maintenance and updating of computer software relating to computer security and prevention of computer risks; Providing temporary use of non-downloadable cloud-based software for monitoring computer systems; Implementation and consulting services in relation to multi-factor authentication technology for restricting access to computer networks and software; Digital forensic investigations in the field of computer security and networks; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
Computer and Scientific