85480894
Nov 25, 2011
Disaster recovery services, namely, business planning and business continuity consulting; Business risk assessment services; Business risk management consultation
Advertising and BusinessComputer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of security assessments of cloud-based applications and services; Design and development of electronic data security systems; Developing and implementing customized plans for businesses and governmental agencies for the protection of data confidentiality, data integrity, and data availability; Development of security systems and contingency planning for information systems; Research in the field of intelligence and security technology; Data encryption services; Computer virus protection services; Computer disaster recovery planning; IT integration services; Computer software risk assessment services; Consulting services in the field of Internet and information security
Computer and ScientificProviding information in the field of Internet and information security practices and protection; Authentication, issuance and validation of digital certificates; Design and implementation of authentication systems for authenticating the identity of users of computer systems and networks in order to control or restrict access; Fraud and identity theft protection services; Security services to prevent electronic data theft, data breaches, and data leakage; Management of user passwords for accessing computer applications and mainframes; Monitoring of computer systems, computer networks, IT infrastructure, and computer applications for security purposes; Electronic signature verification services for security purposes; Security services, namely, providing security assessments of information systems and working environments; Providing websites featuring information on the development of privacy, security and data governance law; Providing an online website featuring information in the field of security threat intelligence relating to computer infrastructure
Personal