Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to consisting of computer systems, hard drives, internal computer networks, and websites; Computer security services, namely, restricting unauthorized network access by consisting of insider threats, external threat actors, and malicious users; Computer security threat analysis for protecting data; Data security consultancy; Design and development of electronic data security systems; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Internet security consultancy; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a secure electronic online system featuring technology which allows vendors to submit electronic invoices to sales representative agencies for importing and processing of electronic invoices to save time and improve accuracy; Providing a secure, web-based service enabling individuals to store and transmit information, including forensic tools, to assist law enforcement and search personnel should a child or dependent adult become a missing person; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions; Providing a secured-access, members only website featuring technology that gives registered Internet networked dental professionals the ability to communicate and share data for the purposes of designing and manufacturing dental restorations; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Providing a website that features technology that enables the secure exchange of information by users; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks
Computer and Scientific