97387545
Apr 28, 2022
Business consulting services; business consulting services in the fields of improving computer and software security through third party software and information technology; Advertising, marketing and promotion services in the field of software and information technology
Advertising and BusinessDevelopment of customized software for others for use in risk assessment, information security, information technology, data security, computer and network security, enterprise architecture; Consulting services in the fields of selection, implementation and use of computer software systems for others; Information technology consulting, research and information services in the fields of information technology, data security, computer and network security, enterprise architecture to align business processes and strategies with the right technology or software applications, computer software and computer systems strategy; computer security consultancy in the fields of anti-phishing incident response and computer intrusion prevention; Computer security services for protecting data and information from unauthorized access; computer services in the nature of filtering of unwanted e-mails; testing of computer security systems; computer security consultation in the field of computer security and assessment of computer security needs; technical support, namely, monitoring of network computer systems by remote access to ensure proper functioning; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability and providing a detailed analysis of computer information security risks to a business and recommendations to eliminate such risks; data encryption services; software as a service (SAAS) services featuring software for use in computer network monitoring and security; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems using computer firewalls for detecting unauthorized access or data breach; Providing temporary use of Online non-downloadable software for reviewing data and running reports;Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and software applications; Providing temporary use of non-downloadable security software; providing temporary use of non-downloadable software for detecting computer viruses, malware and threats; providing temporary use of non-downloadable software in the nature of an online dashboard for accessing, controlling, and adjusting security software; providing temporary use of non-downloadable software featuring an online dashboard for reviewing historical security data and running reports; technical support services for others in the fields of computer, data, and network security, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; computer monitoring service which tracks application software in the nature of collection, compilation, and analysis of data for the purpose of generating and transmitting reports on and ratings of the level of security of enterprise software; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer security systems;Platform as a service (PAAS) featuring computer software platforms for use in connection with computer security systems; Research, design and development of computer software; Computer software development and computer programming development for others; Design, maintenance, development and updating of computer software
Computer and Scientific