Goods and Services | Technology consultation in the field of cybersecurity; computer programming consultancy in the field of cybersecurity; monitoring of computer and industrial computer systems and devices in the nature of SCADA (Supervisory Control and Data Acquisition) systems, HMIs (Human Machine Interface), PLCs (Programable Logic Controller), VFDs (Variable Frequency Drive), DCS (Distributed Control System), and drives for detecting unauthorized access or data breach; computer and industrial network security consultancy; computer security consultancy; computer security services, namely, restricting unauthorized access to computer networks, industrial infrastructures in the nature of SCADA (Supervisory Control and Data Acquisition) systems, HMIs (Human Machine Interface), PLCs (Programable Logic Controller), VFDs (Variable Frequency Drive), DCS (Distributed Control System), and drives, industrial control computer systems, and information technology infrastructures; technical support, namely, monitoring technological functions of computer network systems; monitoring the operation of computer and industrial computer systems and devices in the nature of SCADA (Supervisory Control and Data Acquisition) systems, HMIs (Human Machine Interface), PLCs (Programable Logic Controller), VFDs (Variable Frequency Drive), DCS (Distributed Control System), and drives by remote access; monitoring of computer and industrial computer systems and devices in the nature of SCADA (Supervisory Control and Data Acquisition) systems, HMIs (Human Machine Interface), PLCs (Programable Logic Controller), VFDs (Variable Frequency Drive), DCS (Distributed Control System), and drives by remote access to ensure proper functioning; computer security consultancy in the field of scanning and penetration testing of computers, industrial computer systems and devices nature of SCADA (Supervisory Control and Data Acquisition) systems, HMIs (Human Machine Interface), PLCs (Programable Logic Controller), VFDs (Variable Frequency Drive), DCS (Distributed Control System), and drives, and networks to assess information security vulnerability; development of customized software for others for use in risk assessment, information security, audit and audit planning; consultancy and information services relating to information technology architecture and infrastructure; design and development of computer software systems for monitoring network behavioral patterns to discover risks in the area of digital security and industrial control systems; design and development of computer software systems for monitoring network behavioral patterns to correlate security information in the area of digital security and industrial control systems |