Goods and Services | Computer forensic services; Consulting in the field of information technology; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of software and hardware for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Design and development of computer hardware and software; Design and writing of computer software; Design, development and implementation of software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Software design and development; Technology consultation in the field of cybersecurity; Computer disaster recovery planning; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software design; Computer software design for others; Computer technology consultancy; Computer programming consultancy in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Computer security threat analysis for protecting data; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Consultancy in the field of software design; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Information technology consulting services; Outsource service provider in the field of information technology consulting; Planning, design and management of information technology systems; Providing a website that features technology that enables the secure exchange of information by users; Providing temporary use of non-downloadable computer anti-virus software; Testing, analysis, and evaluation of software and comupter hardware for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling to assure compliance with industry standards |