Goods and Services | Information technology consulting and computer consulting services in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, and cyber security; Information technology consulting services in the field of enterprise system management and monitoring; Computer consultation in the field of computer security compliance and risk consultancy and advisory services; Computer security consultancy and advisory services relating to IT systems, computer security and data security; Information technology support services, namely, monitoring of IT systems and computer security systems; Computer security consultancy and advisory services relating to risk strategies of computers and IT systems; Information technology risk management services in relation to IT systems and computers; Cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; Information technology security consulting services, namely, advising companies in the development and implementation of security strategy alignment, security control optimization and security protection assurance in relation to IT systems and computers; Consulting services relating to corporate strategy and information technology IT systems and computers security control and optimization; Computer security services, namely, security assessments for businesses and individuals in relation to IT systems and computers; Computer security services, namely, assessment, design and development of security services software, systems, applications, procedures, controls, projects and organizations for computers or IT systems; Computer disaster recovery planning; Computer services, namely, data recovery services; Computer forensic services; Consultancy and advisory services relating to computer security and telecommunications technology systems security; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; Data security services, namely, design and development of electronic data security systems; Computer consultancy and advisory services in the field of computer information systems security, namely, data security and information systems risk consultancy and advisory services; Design and development of computer hardware and software relating to the security risk industry; Consultancy, advice, assistance, analysis, design, evaluation and programming services relating to computer software, firmware and hardware relating to the security risk industry; Maintenance of computer software relating to the security risk industry; Computer security consultancy; Information, advisory and consultancy security services relating to the aforesaid services; IT and computer consulting and management services in the fields of cybersecurity, privacy, compliance and risk management; Data security services, namely, design and development of electronic data security systems; Computer services, namely, cloud hosting provider services |