(Based on Intent to Use) Business consulting services in the field of cybersecurity; Business consulting services in the field of disaster planning and recovery; Business risk assessment services(Based on 44(d) Priority Application) Business consulting services in the field of cybersecurity; Business consulting services in the field of disaster planning and recovery; Business risk assessment services
Advertising and Business(Based on Intent to Use) Technical consulting in the field of cybersecurity risk management training(Based on 44(d) Priority Application) Technical consulting in the field of cybersecurity risk management training
Education and Entertainment(Based on Intent to Use) Computer disaster recovery planning; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer technology consultancy in the field of disaster mitigation, namely, the development of computer disaster mitigation strategies in the event of a natural disaster; Data security consultancy; Internet security consultancy; Providing on-line non-downloadable software for use in analyzing and benchmarking cybersecurity risk; Providing temporary use of non-downloadable cloud-based software for updating of computer software relating to computer security and prevention of computer risks; Technology consultation in the field of cybersecurity(Based on 44(d) Priority Application) Computer disaster recovery planning; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer technology consultancy in the field of disaster mitigation, namely, the development of computer disaster mitigation strategies in the event of a natural disaster; Data security consultancy; Internet security consultancy; Providing on-line non-downloadable software for use in analyzing and benchmarking cybersecurity risk; Providing temporary use of non-downloadable cloud-based software for updating of computer software relating to computer security and prevention of computer risks; Technology consultation in the field of cybersecurity
Computer and Scientific