Goods and Services | Training and education services, namely, conducting classes, seminars, conferences, workshops in the fields of computer and computer network security services; training and education services, namely, conducting classes, seminars, conferences, workshops in the fields of computer intrusion, detection, prevention and countermeasures; education and training services, namely, conducting classes, seminars, conferences, workshops in the fields of assessment of information security and vulnerability; training and education services, namely, conducting classes, seminars, conferences, workshops for network and website administrators in the fields of computer and computer network security services; training and education services, namely, conducting classes, seminars, conferences, workshops in the field of telecommunications security; organising educational competitions and events in the fields of computer hardware, software and firmware, and telecommunications hardware, software and firmware for educational purposes |
Goods and Services | Computer services, namely, computer security consultation in the field of computer hacker countermeasures; computer security consultancy, namely, providing network penetration testing, address spoofing and analysis of computer networks and software programs for security risks and vulnerability; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; consulting in the field of telecommunications technology, namely, analysis of telecommunications networks and telecoms software and hardware for security risks and vulnerability; data security consultancy, namely, testing of data security practices and procedures for compliance with best practice; computer security consultancy; computer security system monitoring services, namely, monitoring of computer systems for detecting unauthorized access or data breach; authentication and certification services for computer security, namely, computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; provision of computer security services for computer networks, computer access and computerised transactions, namely, restricting unauthorized network access by users without credentials; updating of computer software relating to computer security and prevention of computer risks; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for security purposes, namely, monitoring of computer systems for detecting unauthorized access or data breach; provision of computer security risk management programs, namely, maintenance of computer software relating to computer security and prevention of computer risks; computer security threat analysis for protecting data; computer programming services for electronic data security; computer security services for protection against illegal network access, namely, restricting unauthorized access to computer networks; computer security services in the nature of administering digital certificates; managed computer server centres, namely, server hosting; information technology (IT) services, namely, information technology (IT) consulting services; planning, design and management of information technology systems; computer programming; cloud computing services, namely, consulting services in the field of cloud computing; computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; computer services, namely, cloud hosting provider services; hosting of digital content on the Internet; computer services, namely, cloud hosting provided services in the nature of cloud hosting of electronic databases and virtual computing environments; server hosting; computer time-sharing services; providing virtual computer systems and virtual computer environments through cloud computing; computer services, namely, providing virtual application, web, file, database and storage servers of variable capacity to others; scaling services, namely, providing variable computing and electronic data storage capacity to others; administering and maintaining databases and virtual computing environments for others, namely, providing virtual computer systems and virtual computer environments through cloud computing; application service provider (ASP), namely, hosting computer software applications and databases of others; computer services, namely, hosting, managing, provisioning, scaling, administering, maintaining, monitoring, securing, encrypting, decrypting, replicating and backing up databases and cloud computing environments for others; data warehousing; technical support services, namely, troubleshooting of computer software problems; computer services, namely, monitoring the web sites of others to improve their scalability and performance; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing and network resources based on assigned credentials; software as a service (SAAS) services featuring software for managing and deploying virtual machines to a cloud computing platform; software as a service (SAAS) services featuring software for running cloud computing based applications; software as a service (SAAS) services featuring software platforms for cloud computing networks and applications; software as a service (SAAS) services featuring software that provides access to cloud-based scalable computing resources and data storage; software as a service (SAAS) services featuring software for monitoring cloud and application performance; software as a service (SAAS) services featuring software for event logging, reporting, analysis and alert generation; software as a service (SAAS) services featuring software for collecting, editing, modifying, organizing, synchronizing, integrating, monitoring, transmitting, storage and sharing of data and information; software as a service (SAAS) services featuring software for data, desktop and application streaming; software as a service (SAAS) services featuring software for data backup, recovery and archiving; software as a service (SAAS) services featuring software for data transfer and migration; software as a service (SAAS) services featuring software for data protection and data security; software as a service (SAAS) services featuring software for data warehousing; software as a service (SAAS) services featuring database management software; software as a service (SAAS) services featuring software for creating, configuring, provisioning and scaling databases; software as a service (SAAS) services featuring software for storing, retrieving, caching, extracting, formatting, structuring, systematizing, organizing, indexing, processing, querying, analyzing, replicating and controlling access to data; software as a service (SAAS) services featuring software for logging changes within a database; software as a service (SAAS) services featuring software for improving database performance; software as a service (SAAS) services featuring software for configuring, provisioning and scaling data cache storage for databases; software as a service (SAAS) services featuring software for computer network management and automation; software as a service (SAAS) services featuring software for monitoring, tracking, logging and analyzing computer network events, user activity, changes to resource activity and security statistics; software as a service (SAAS) services featuring network security software; software as a service (SAAS) services featuring network threat detection software; software as a service (SAAS) services featuring network access management and monitoring software |