Goods and Services | Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, integration of computer software into multiple systems and networks; Computer services, namely, integration of private and public cloud computing environments; Computer systems integration services; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the field of cloud computing; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data conversion of computer program data or information, other than physical conversion; Data conversion of electronic information; Data decryption services; Data encryption and decoding services; Data encryption services; Data migration services; Data security consultancy; Design and development of electronic data security systems; Digital compression of computer data; Document data transfer from one computer format to another; Electronic data storage; IT consulting services relating to installation, maintenance and repair of computer software; IT integration services; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Recovery of computer data; Recovery of smartphone data; Rental of computer hardware; Server hosting; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Troubleshooting in the nature of diagnosing problems with consumer electronics; Troubleshooting of computer software problems; Updating of computer software; Computer network configuration services; Computer network design for others; Computer rental; Computer security consultancy; Computer security threat analysis for protecting data; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, encrypted data recovery services; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer services, namely, data recovery services; Computer services, namely, remote management of the information technology (IT) systems of others; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer technology support services, namely, help desk services; Consulting in the field of IT project management; Consulting services in the field of office and workplace automation; Electronic data back-up services; Internet security consultancy; Maintenance and updating of computer software; Off-site data backup; Planning, design and management of information technology systems; Remote online backup of computer data; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technological consultancy services in the field of search engine optimization; Technology consultation in the field of cybersecurity; computer disaster recovery planning; maintenance of computer software testing relating to computer security and prevention of computer risks; testing of computer hardware; testing of computer software; testing of computer software and hardware for computer security risk assessment and management; testing of security systems; updating of computer software relating to computer security and prevention of computer risks; business continuity and disaster recovery services; business continuity and disaster recovery planning; computer security risk testing; computer security risk management; information technology (IT) policy creation; information technology (IT) policy management; Technical support, namely, monitoring technological functions of computer network systems |