Information technology network security monitoring and consulting services, namely, providing computer security strategies to enterprises to help them guard their intellectual property, data and network infrastructure against cyber security attack, and conducting computer security assessments involving penetration testing of computers and networks to determine information security vulnerability; Information technology security monitoring services, namely, monitoring and maintaining information technology infrastructures of enterprises to guard data and information from unauthorized access; information technology security incident response services, namely, restricting unauthorized computer network access by users without credentials; Managed information technology security services, namely, computer security threat analysis and testing for protecting data; Threat hunting computer security services, namely, detection of ongoing and zero-day cyberattacks and advanced persistent threats as well as other advanced hackers tactics, techniques and procedures and indicators of compromise
Computer and Scientific