Goods and Services | Technology consultation in the field of cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer and industrial systems and devices; computer programming consultancy in the field of cybersecurity; monitoring of computer and industrial systems and devices for detecting unauthorized access or data breach; computer network security consultancy; computer security consultancy; computer security services, namely, restricting unauthorized access to computer networks, industrial infrastructures, industrial control systems, and information technology infrastructures; technical support, namely, monitoring technological functions of computer network systems; monitoring the operation of computer and industrial systems and devices in the nature of ICS (Industrial Control System) equipment, HMIs (Human Machine Interface) and PLCs (Programable Logic Controller) by remote access; monitoring of computer and industrial systems and devices in the nature of ICS (Industrial Control System) equipment, HMIs (Human Machine Interface) and PLCs (Programable Logic Controller) by remote access to ensure proper functioning; computer security consultancy in the field of scanning and penetration testing of computers, industrial systems and devices, and networks to assess information security vulnerability; development of customized software for others for use in risk assessment, information security, audit and audit planning; consultancy and information services relating to information technology architecture and infrastructure; Software as a Service (SAAS) featuring software for use in real-time monitoring of computer networks; Software as a Service (SAAS) featuring software for use in protecting computer and industrial systems and devices through integration with existing system infrastructure; providing on-line non-downloadable software for use in monitoring of computer and industrial systems and devices for security purposes; data security services, namely, design and development of electronic data security systems in connection with industrial infrastructures and industrial control systems; technical support, namely, troubleshooting, installation, administration in the nature of updating and installation, and repair of computer software, and consulting services in the fields of computer security, vulnerability of computer and industrial systems and devices, networks, software applications, digital devices, digital data, cyber-attacks and threats against computers, computer and industrial systems and devices, networks, software applications, digital devices, digital data, and mobile devices; technical support services, namely, troubleshooting, installation, administration, and repair of computer software, in the nature of detecting and diagnosing computer and industrial control software security problems and vulnerabilities, updating and maintenance of computer and industrial control software relating to security and to prevention and mitigation of cyber-security risks; compiling and analyzing technology data relating to digital safety and cyber security; technology consultation in the field of digital safety and cyber security, namely, providing industrial preparedness, resiliency, risk and threat scoring services; design and development of computer software systems for monitoring network behavioral patterns to discover risks in the area of digital security and industrial control systems; design and development of computer software systems for monitoring network behavioral patterns to correlate security information in the area of digital security and industrial control systems |