Goods and Services | Technology consultation in the field of information systems threat analysis and network security; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services namely remote and on-site management of information technology (IT) systems of others comprised of computer software systems used in provision of information technology security services for others; Monitoring of computer systems for detecting unauthorized access or data breach; providing computer virus protection services; providing computer services, namely, online scanning and detecting of viruses, spyware, adware, malware, ransomware, and other malicious code and programs on computers and electronic devices; computer security services, namely, restricting unauthorized network access by users without credentials to hard drives, computer networks and websites; Information technology security network infrastructure consulting services, namely, providing security strategies to assist businesses in protecting their intellectual property, data and network infrastructure against cyber security attack, and conducting security, vulnerability and penetration assessments; information technology computer security consultancy in the field of incident response, risk assessments, cyber security compliance, regulation compliance, and other practices of consultancy in relation to cyber security; Computer security threat analysis for protecting data from cyber threats and incidents; Managed information technology security services, namely, computer security threat analysis for protecting data; Monitoring of computer systems for detecting unauthorized access or data breach, namely, monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Computer security threat analysis for protecting data, namely, assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy and monitoring of computer systems for detecting unauthorized access or data breach, namely, Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services |