Goods and Services | Consulting in the field of asset protection, namely, consulting in the field of Intellectual Property, Proprietary, Personal Identifiable, and Classified Information Asset protection in the nature of cybersecurity, security, counterintelligence, Intellectual Property, Proprietary, Personal Identifiable, and Classified Information asset protection, insider threat detection, cyber security programs, and engineering integration, all the aforementioned expressly excluding virtual data centers, financial services, leasing, software as a service, financial portfolio management, investment fund transfer, estate settlement services, financial asset allocation, cashflow management, investments and wealth management, investment advisory services, security guard services, home security, private investigation, security surveillance, executive protection, online storage, leasing of network hardware, computer hardware and software for database resource allocation, computer software for large scale data storage and archiving, and computer software for secure file management |
Goods and Services | Consulting in the field of home security, surveillance as it relates to counterintelligence, security for protection of property and individuals, and insider threat detection as it relates to security threat analysis for protecting personal property and Intellectual Property, Proprietary, Personal Identifiable, and Classified Information assets, all the aforementioned expressly excluding virtual data centers, financial services, leasing, software as a service, financial portfolio management, investment fund transfer, estate settlement services, financial asset allocation, cashflow management, investments and wealth management, investment advisory services, security guard services, home security, private investigation, security surveillance, executive protection, online storage, leasing of network hardware, computer hardware and software for database resource allocation, computer software for large scale data storage and archiving, and computer software for secure file management |
Goods and Services | Engineering; Cybersecurity engineering services in the nature of restricting unauthorized access to computer systems; Engineering services in the field of cybersecurity, security, counterintelligence, Intellectual Property, Proprietary, Personal Identifiable, and Classified Information asset protection, insider threat detection, cyber security programs, and integration; Engineering services, namely, engineering for the cybersecurity, security, counterintelligence, Intellectual Property, Proprietary, Personal Identifiable, and Classified Information asset protection, insider threat detection, cyber security programs, and integration fields, all the aforementioned expressly excluding virtual data centers, financial services, leasing, software as a service, financial portfolio management, investment fund transfer, estate settlement services, financial asset allocation, cashflow management, investments and wealth management, investment advisory services, security guard services, home security, private investigation, security surveillance, executive protection, online storage, leasing of network hardware, computer hardware and software for database resource allocation, computer software for large scale data storage and archiving, and computer software for secure file management; Computer programming consultancy in the field of cybersecurity, security, counterintelligence, engineering, Intellectual Property, Proprietary, Personal Identifiable, and Classified Information asset protection, insider threat detection as it relates to cybersecurity, and integration engineering, all the aforementioned expressly excluding virtual data centers, financial services, leasing, software as a service, financial portfolio management, investment fund transfer, estate settlement services, financial asset allocation, cashflow management, investments and wealth management, investment advisory services, security guard services, home security, private investigation, security surveillance, executive protection, online storage, leasing of network hardware, computer hardware and software for database resource allocation, computer software for large scale data storage and archiving, and computer software for secure file management; Technology consultation in the field of cybersecurity, insider threat detection as it relates to cybersecurity, and integration engineering, all the aforementioned expressly excluding virtual data centers, financial services, leasing, software as a service, financial portfolio management, investment fund transfer, estate settlement services, financial asset allocation, cashflow management, investments and wealth management, investment advisory services, security guard services, home security, private investigation, security surveillance, executive protection, online storage, leasing of network hardware, computer hardware and software for database resource allocation, computer software for large scale data storage and archiving, and computer software for secure file management; Technology consultation in the field of cybersecurity, all the aforementioned expressly excluding virtual data centers, financial services, leasing, software as a service, virtual datacenters, financial portfolio management, investment fund transfer, estate settlement services, financial asset allocation, cashflow management, investments and wealth management, investment advisory services, security guard services, home security, private investigation, security surveillance, executive protection, online storage, leasing of network hardware, computer hardware and software for database resource allocation, computer software for large scale data storage and archiving, and computer software for secure file management; |