| Goods and Services | Computer network management and monitoring of technological functions of computer network systems; computer security services, namely, consultancy, threat analysis for protecting data, security threat identification for computer network protection purposes, intrusion detection, virus protection, managed firewall services, enforcing and restricting access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, filtering unwanted emails, and monitoring network traffic for security purposes including prevention of cyberattacks; internet security services, namely, globally monitoring and collecting cybersecurity intelligence about software threats for the purpose of collecting and disseminating information about cyber threats and malware; technical research in the field of cybersecurity for others; technical research in the field of network security threats; providing temporary use of non downloadable cloud based software for detecting and analyzing malware and exploits; providing temporary use of non downloadable cloud based software for data security and protection; computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data and information, networks, servers, applications, desktop computers, and computing devices against attack, intrusion, and misuse; monitoring of network traffic for security purposes, for detecting, preventing, and mitigating cyber threats, cyberattacks, and malicious activity affecting computer servers connected to the Internet; security threat management services, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks, and protection of computer data and information, networks, servers, applications, and desktop computers; providing information security incident response services, namely, detecting and mitigating unauthorized access to computer networks and computer systems; testing, analysis, and evaluation of computer networks, servers, applications, desktop computers, and computing devices to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting, monitoring, and remediation of technical computer security network software problems |