Goods and Services | Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites, cloud storage devices, computer systems; Computer security services, namely, restricting unauthorized network access by users without credentials, unauthorized users; Computer services, namely, remote management of information technology (IT) systems of others comprised of Trusted IT Solutions, including Managed IT Services, Virtual CTO/CIO/CSO, Cybersecurity related software products and services, Penetration Testing, Incident/Breach Response, Vulnerability Assessment and Monitoring, Security Awareness Training and Phishing Exercises, Cloud Solutions, and IT Support; Computer services, namely, on-site management of information technology (IT) systems of others comprised of Trusted IT Solutions, including Managed IT Services, Virtual CTO/CIO/CSO, Cybersecurity related software products and services, Penetration Testing, Incident/Breach Response, Vulnerability Assessment and Monitoring, Security Awareness Training and Phishing Exercises, Cloud Solutions, and IT Support; Computer services, namely, remote management of the information technology (IT) systems of others; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT consulting services relating to installation, maintenance and repair of computer software; Technological planning and consulting services in the field of Trusted IT Solutions, including Managed IT Services, Virtual CTO/CIO/CSO, Cybersecurity related software products and services, Penetration Testing, Incident/Breach Response, Vulnerability Assessment and Monitoring, Security Awareness Training and Phishing Exercises, Cloud Solutions, and IT Support; Computer programming consultancy in the field of Trusted IT Solutions, including Managed IT Services, Virtual CTO/CIO/CSO, Cybersecurity related software products and services, Penetration Testing, Incident/Breach Response, Vulnerability Assessment and Monitoring, Security Awareness Training and Phishing Exercises, Cloud Solutions, and IT Support; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Monitoring of computer systems for detecting unauthorized access or data breach; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technology consultation in the field of cybersecurity |