Goods and Services | Software as a service (SAAS) services featuring software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting and cybersecurity management; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of Cyber security management; Development of software for secure network operations; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer technology support services, namely, help desk services; Internet Protocol (IP) address verification services; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, internet protocol address management; Computer services, namely, remote management of information technology (IT) systems of others comprised of Unified Threat Management (UTM) devices, firewalls, Wireless Detection (WDS) monitors and other network access solutions that guard and protect network gateways, network communications and data integrity; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer services, namely, providing search engines for obtainingSecurity Information and Event Management (SIEM) logs on a global computer network; Monitoring of computer systems by remote access to ensure proper functioning; Providing virtual computer systems and virtual computer environments through cloud computing; Design, deployment and management of wireless networks for others; Platform as a service (PAAS) featuring computer software platforms for advanced Cyber network protection, employing the latest security hardware and operating system technologies, coupled with physical 24/7 monitoring to identify and respond to critical security events |