88519900
Jul 17, 2019
Jun 22, 2021
Active Trademark
Technical consulting services in the field of selection, implementation and use of computer hardware and software systems for others and computer system architecture for servers, electronic information storage devices, telecommunications networks, and virtual desktop infrastructure for others; technical consulting services for selecting, implementing and using computer hardware and computer software applications; computer systems services, namely, design, installation and management of information technology (IT) systems of others; technical support services, namely, remote and on-site infrastructure management services for implementation, administration and management of datacenter architecture and systems of others, of computing IT and cloud, mobile, and network application systems of others, of internet technology and services of others; information technology and computer security and compliance services, namely, threat analysis, scanning and penetration testing of computers and networks, administering digital keys ad certificates, maintenance and updating computer software to prevent computer security risks, prevention and mitigation of computer risks; consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; computer consultation in the field of computer software systems for data analytics and analysis; technical consulting services in the fields of datacenter architecture, cloud computing solutions, and evaluation and implementation of, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources; testing, analysis, and evaluation of computer security services for protecting data and information from unauthorized access to assure compliance with computer industry standards; information technology consulting services in the field of information technology infrastructure, integration, value-added software and information systems, and information technology security services and consulting
Computer and Scientific