Goods and Services | Technology consultation in the field of cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems and networks; Cybersecurity services in the nature of restricting unauthorized access to computer systems, namely, setting up and managing cybersecurity controls to restrict unauthorized access to computer systems and networks; computer security consultation, namely, providing managed detection and response (MDR) services for monitoring and protecting systems; computer services, namely, cybersecurity services in the nature of online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware, and unauthorized data and programs on computers and electronic devices; providing multi-factor authentication (MFA) solutions, namely, authentication, issuance and validation of digital certificates; providing online, non-downloadable antivirus software; computer security consultancy, namely, vulnerability scanning services to identify and mitigate security risks in computer systems and networks; Monitoring of computer systems for detecting unauthorized access or data breach, namely, providing security information and event management (SIEM) services for logging, monitoring, and analyzing system activities to detect security threats; providing IT team services for ongoing cybersecurity support, namely, IT consulting services relating to installation, maintenance and repair of computer software; Providing user authentication services using multi-factor authentication technology for cybersecurity services, namely, logging into computer; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer disaster recovery planning in the field of cybersecurity; Updating of computer software relating to computer security and prevention of computer risks; Maintenance of computer software relating to computer security and prevention of computer risks in the field of cybersecurity; Computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer services, namely, filtering of unwanted e-mails; Monitoring of computer system operation by remote access; Monitoring of computer systems by remote access to ensure proper functioning for cybersecurity purposes; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts for cybersecurity purposes |