86799459
Oct 26, 2015
Operation and supervision of business facilities for secure, in-person business transactions between buyers and sellers of goods and/or services; Promoting the use of the security assurance best practices of others in the field of cloud computing; Value-added reseller services, namely, distributorship services featuring computer security and information technology products
Advertising and BusinessComputer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Providing technology information updates for home security systems via the global computer network; Rental of computers relating to computer security and prevention of computer risks; Research in the field of intelligence and security technology
Computer and ScientificComputer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of homeland security; Consulting services in the field of maintaining the security and integrity of databases; Consulting services in the field of national security; Consulting services in the field of security intelligence; Providing news concerning homeland safety and security issues; Security services, namely, providing security assessments for businesses and governmental agencies; Security services, namely, providing security assessments of physical locations, information systems, and working environments; Security threat analysis for personal protection purposes; Security threat analysis for protecting personal property; Security threat analysis for protecting public safety; Verifying and monitoring the security credentials of event staff for various private and public sports or entertainment events to ensure public safety
Personal