77959552
Mar 15, 2010
Dec 21, 2010
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability and validate compliance with applicable regulations and industry standards; computer services, namely, online-line external and internal network scanning, detecting, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs from the computer networks; design of computer hardware, integrated circuits, communications hardware and software and computer networks for others; back-up services for computer hard drive data; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; technical support, namely, providing back-up computer programs and facilities; remote computer backup services, namely, redundancy, dial-up back-up, high speed back-up and secure wireless back-up; design, deployment and management of wireless networks for others; design and development of wireless computer networks; computer services, namely, on-line scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; update of computer software to meet and respond to current threats, standards and industry changes; technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; computer technology support services, namely, help desk services, including online tool for allowing others to monitor and manage their networks and sites; application service provider (ASP), namely, hosting computer software applications of others; hosting of digital content on the internet. hosting the web sites of others on a computer server for a global computer network; computer software design for others and computer software customization; planning, design and management of information technology systems for public and private use; design and development of electronic data security systems applications; computer security consultation, namely, consultation concerning risk assessments and risk management strategies; computer virus protection and data encryption services designed to reduce security exposure, increase data integrity and confidentiality; computer network design for others, namely, designing for virtual private networks; updating of computer software relating to computer security and prevention of computer risks; computer services, namely, disaster recovery of data and software applications
Computer and Scientific