| Goods and Services | Technology consultation in the field of cybersecurity; Monitoring of computer systems to detect cybersecurity incidents; Computer security threat analysis for protecting data; Electronic monitoring of personally identifying information to detect identity theft via the internet; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; Consultancy in the field of artificial intelligence (AI) technology; Research in the field of artificial intelligence; Platform as a service (PAAS) featuring computer software platforms for cybersecurity; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer security consultancy in the field of security and compliance assessments and vulnerability analysis; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for cybersecurity and fraud detection; Installation, maintenance and repair of cybersecurity software; Providing on-line non-downloadable software for computer security and virus protection; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish system installation and configuration automation |