85953907
Jun 7, 2013
computer software and computer hardware for testing and evaluating computers, computer networks and information technology systems for security vulnerability and risk relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for providing cyber-security, cyber-defense, information security and assurance, data security, computer security, network security and prevention of hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for monitoring, detecting, inspecting, processing, analyzing, mitigating and remediating computers, computer networks and information technology systems for hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for risk mitigation and remediation, integrity and threat analysis, cyber event data analysis, digital data intelligence gathering and analysis and dispatch of security countermeasures relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for data warehousing, data analysis, threat detection, measurement and evaluation of security process effectiveness and security management controls relating to computer security, network security and information technology systems security; computer software for security information and event management and defense against hacking, cyber-attacks, computer crimes and computer viruses, including monitoring computer, network and information technology system activity and identifying, investigating and responding to information security threats; computer programs for collecting, storing and managing network and enterprise log records and call detail record retention and retrieval relating to computer and network security
Electrical and Scientific Apparatuscomputer and technical support services, namely testing of computer systems and networks for security purposes; updating and maintaining computer software relating to computer security, network security, information technology security and data security, and prevention of computer risks, including hacking, cyber-attacks, computer crimes and computer viruses; computer consultation in the field of computer security, network security, information technology security and data security; and providing information in the nature of computer security consultations in the field of computer security, network security, information technology security and data security
Computer and Scientificcomputer and technical support services, namely monitoring of computer systems and networks for security purposes
Personal