86074618
Sep 25, 2013
Information technology (IT) security services, namely, computer consultation in the field of computer and network security and in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Information technology (IT) security services, namely, computer services that provide online scanning, detecting, quarantining, and eliminating of viruses, worms, Trojans, spyware, adware, malware, and unauthorized data and programs on computers, networks, and electronic devices; Information technology (IT) security services, namely, computer network management services, namely, managing the computer networks of others to provide protection from computer network intrusions in connection with computer network security systems; Information technology (IT) security services, namely, technical support services in the field of computer network security, namely, troubleshooting of computer hardware and software problems, and identifying technical solutions for computer network security problems; Computer services, namely, management of the information technology (IT) systems of others; Computer services, namely, management of information technology (IT) security for others, namely, managing the computer networks of others to provide protection from computer network intrusions, to detect computer network intrusions, to alert the customer as to computer network intrusions, to respond to computer network intrusions, to eliminate computer network intrusions, and to prevent computer network intrusions, all in connection with computer network security systems; Software as a service (SAAS) services featuring software for use in protecting and maintaining information technology security and in responding to and preventing breaches of information technology security
Computer and ScientificMonitoring of computer systems for security purposes; Computer security services, namely, monitoring the security status of computer networks and generating security responses based on network intrusion alerts; Providing methods and procedures for the management of computer and network threats, namely, surveillance and monitoring of security problems and vulnerabilities in computer hardware, networks, and software
Personal