Business consulting services in the field of information assurance; Business risk assessment services; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a secured access database via the Internet through which documents and images can be viewed, copied, and printed for purposes of conducting corporate transactions
Advertising and BusinessComputer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Providing quality assurance services in the field of information security compliance and governance
Computer and ScientificComputer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Consultation in the field of data theft and identity theft; Reviewing standards and practices to assure compliance with Government Information Assurance laws and regulations; Security services, namely, providing electronic alerts notifying of a changed status or condition of a sensing device via the Internet; Security services, namely, providing security assessments for businesses and governmental agencies; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security services, namely, threat simulation vulnerability analysis and mitigation and emergency and crisis response
Personal