Provide consulting services and technical support related to information security and vulnerability to and from cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software information security problems and vulnerabilities, updating and maintenance of computer software relating to information security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; consultation and research in the field of computer hardware, computer software and network security; information security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information security services in the nature of providing dynamically scored evaluations of a client's physical, administrative and technical controls, and to provide security analysis of network traffic, emails, files, media computer software, and mobile applications; provide analysis for use in detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices
Computer and Scientific