| Pseudo Mark | MAIN MICRO |
| Goods and Services | Computer security consultancy; Computer network security consultancy; Computer software consultation; Computer technology consultancy; Computer technology support services, namely, help desk services; Technical support services, namely, troubleshooting of computer software problems; Information technology consulting relating to computer network design; Providing temporary use of on-line non-downloadable cloud-based computing software for storing electronic data and information for computer backup purposes; Technical support, namely, providing computer facilities for the electronic storage of digital data; Computer security and technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems, all for the purpose of incident response and analysis, hardware deployment and installation, security scanning, security management, vulnerability management, IT project management, incident management, regional troubleshooting in the nature of repair of medical equipment, request fulfillment, cloud computing featuring software for use in document management, computer backup and data restoration management, database management, print management, release, deployment and decommissioning, server management, storage management, software application development, infrastructure support, application planning and data warehousing, network management, data management, enterprise data backup, data exchange simple mail transfer protocol (SMTP) relays, email enterprise network, services, advertising, domain name system (DNS) management, clock cloud computing, cloud data storage, cloud computing infrastructure, internet of things, artificial intelligence, data backup and recovery, disaster recovery, IT consulting, managed computer security, network management, technology support, managed desktop computing, managed IT computing, managed computing, remote monitoring and management, data analysis, IT consulting, computer backup solutions, cloud computing, cybersecurity maintenance, IT helpdesk support, computer project management, computer training and awareness, advanced troubleshooting, software development, computer systems integration IT support and proactive monitoring, anti-spam protection, antivirus protection, document backup, web filtering, data patch management, IT road map, data end-point protection, ransomware protection and rollback, digital mobile device management, security awareness training, hard drive encryption, dark web scanning, email phishing campaigns, email archiving, email encryption, email business continuity, network device monitoring, and full client device backup |
| Goods and Services | Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Value-added reseller services, namely, distributorship services featuring computer software and hardware; Value-added reseller services, namely, distributorship services featuring computer software and hardware, namely, desktop computers and computer workstations, notebook computers and accessories therefor, notebook computer and tablet computers accessories, point-of-sale equipment, servers, traffic balancers and optimizers in the nature of computer servers for balancing internet traffic, digital book readers and electronic book readers for use on tablet computers, printers and scanners, office requisites, printer supplies and maintenance kits, scanners, barcode scanners, scanner accessories, computer network bridges and routers, communication hubs and computer switches, modems, network adapters, computer network cables, tools and tool kits for use with computers and computer software for computer network security, computer hardware in the nature of firewalls and VPN (virtual private network) hardware, IP Cameras, network security appliances, network security software, specialized network devices, VoIP, VoIP Phones, VoIP Software, computer network antennas and accessories, computer hardware and computer support software, antivirus and computer security software, authentication software, encryption software, video surveillance software, VPN (virtual private network) operating software, audio and video recordings, business and business productivity software, cellular phones, cellular phone accessories, conference phones, PBX (private branch exchange) phones and systems consisting primarily of digital phones, phone accessories, video and audio conferencing equipment, headphones, headphones accessories, microphones, speakers, TV and radio antennas, video converters, digital signage displays, video surveillance equipment, security cameras, security DVRs, electric locks and computer security hardware, office furniture and accessories therefor, gateway routers and ethernet controllers, electrical supplies, computer monitor accessories, VR (virtual reality) headsets, video projectors, electronic storage devices, computer memories, computer memories for use with upgrading computers, RAM (random access memory) card, network storage computer memories, KVM switches, data processors, downloadable operating system programs, cameras and camcorders, and air cooling and heating equipment |
| Goods and Services | Computer security consultancy; Computer network security consultancy; Computer software consultation; Computer technology consultancy; Computer technology support services, namely, help desk services; Technical support services, namely, troubleshooting of computer software problems; Information technology consulting relating to computer network design; Providing temporary use of on-line non-downloadable cloud-based computing software for storing electronic data and information for computer backup purposes; Technical support, namely, providing computer facilities for the electronic storage of digital data; Computer security and technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems, all for the purpose of incident response and analysis, hardware deployment and installation, security scanning, security management, vulnerability management, IT project management, incident management, regional troubleshooting in the nature of repair of medical equipment, request fulfillment, cloud computing featuring software for use in document management, computer backup and data restoration management, database management, print management, release, deployment and decommissioning, server management, storage management, software application development, infrastructure support, application planning and data warehousing, network management, data management, enterprise data backup, data exchange simple mail transfer protocol (SMTP) relays, email enterprise network, services, advertising, domain name system (DNS) management, clock cloud computing, cloud data storage, cloud computing infrastructure, internet of things, artificial intelligence, data backup and recovery, disaster recovery, IT consulting, managed computer security, network management, technology support, managed desktop computing, managed IT computing, managed computing, remote monitoring and management, data analysis, IT consulting, computer backup solutions, cloud computing, cybersecurity maintenance, IT helpdesk support, computer project management, computer training and awareness, advanced troubleshooting, software development, computer systems integration IT support and proactive monitoring, anti-spam protection, antivirus protection, document backup, web filtering, data patch management, IT road map, data end-point protection, ransomware protection and rollback, digital mobile device management, security awareness training, hard drive encryption, dark web scanning, email phishing campaigns, email archiving, email encryption, email business continuity, network device monitoring, and full client device backup |