Goods and Services | Computer security and cybersecurity consultancy; Computer security service, namely, restricting access to computers and computer networks by undesired web sites, media, computers, computer networks, individuals and facilities; Computer security threat analysis for protecting data, computers, electronic devices and computer systems; Computer virus protection and hacking protection services; Monitoring of computers and computer systems for detecting unauthorized access or data breach; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, ransomware, adware, malware and unauthorized data and programs on computers and electronic devices and preventing of third party hacking into computers, computer systems and electronic devices; Computer security services, namely, protecting computers, computer networks, electronic devices and computer systems against electronic attacks in the nature of computer viruses, hacking, tampering, unauthorized intrusion and unauthorized manipulation of data; Computer security services, namely, restricting unauthorized computer network access by intruders, unauthorized users and individuals, and users with and without credentials; Technology consultation in the field of computer security and cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Cybersecurity risk assessment services; Cybersecurity services in the nature of content filtering, managed virus protection, security risk assessment, internal and external network threat testing, web application threat testing, phishing threat testing, social engineering threat testing and wireless network threat testing; Managed virus protection services in the nature of providing anti-virus, anti-phishing and ransomware protection for computers, computer services and electronic devices; Computer security service, namely, restricting access to and by computers, electronic devices, computer systems and computer networks to and of undesired web sites, media and individuals and facilities; Computer services, namely, remote management of the information technology (IT) systems of others; Technical support services, namely, remote computer, electronic devices and computer systems management services for cybersecurity, computer security, virus protection, hacking and threats attempts, ransomware and phishing; Technical support, namely, monitoring technological functions of computer network systems; Computer, electronic device and computer system security vulnerability analysis; Consultancy in the fields of internet security, data security, computer security, and cyber security; Monitoring and testing computer terminals, computers, electronic devices, computer systems, servers, networks and end points directed toward the detection of cybersecurity exploits and protecting against information security vulnerability |