Goods and Services | Technology research for others in the field of cyber security, data and information security, and computer or telecommunication network security; product research and development services for others in the field of cyber security; technical consulting services in the field of cyber security, namely, technical consulting in the fields of datacenter security architecture, datacenter architecture, information technology architecture and infrastructure, enterprise information technology architecture and infrastructure, and public and private cloud computing solutions; technology consultation services in the field of cyber security, namely, analyzing cyber security technology requirements of others and developing recommendations for the computer software and systems and other technology needed to meet those requirements, technological consultation in the field of selecting appropriate cyber security technologies that meet business and technical requirements; computer consulting services regarding implementation and integration of information technology solutions in the field of cyber security, namely, consultancy and information services relating to information technology architecture and infrastructure, consulting services in the field of design, selection, implementation and use of computer network security hardware and software systems for others; managed computer security services, namely, providing computer security threat analysis for protecting data, computer security consultancy, computer network security consultancy, testing, analysis, and evaluation of computer network security software to assure compliance with industry standards, and scanning and penetration testing of computers and networks to assess information security vulnerability; managed computer security services, namely, malware mitigation in the nature of scanning, detection, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, and malware; computer network security services and communications network security services for network intrusion protection, namely, monitoring of computer systems for detecting unauthorized access or data breach, Scanning and penetration testing of computers and networks to assess information security vulnerability, managing endpoint security on networks by enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, computer security threat analysis for protecting data, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices, computer forensic services and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non-downloadable cyber security software for restricting unauthorized access to computer systems; computer security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of software for the creation of computer network firewalls, virtual private networks, and for detecting unauthorized computer system access or data breach; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities |