Goods and Services | Computer services, namely, internet protocol address management; Computer virus protection services; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Internet Protocol (IP) address verification services; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Platform as a service (PAAS) featuring computer software platforms for advanced Cyber network protection, employing the latest security hardware and operating system technologies, coupled with physical 24/7 monitoring to identify and respond to critical security events; Software as a service (SAAS) services featuring software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting and cybersecurity management; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Design, deployment and management of wireless networks for others; Monitoring of computer systems by remote access to ensure proper functioning; Research in the field of intelligence and security technology; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of Cyber security management |