Goods and Services | Technology consultation in the fields of information technology, cybersecurity, and security analysis; Information technology consulting services; Computer programming consultancy in the fields of Information technology and cybersecurity; Technical support services, namely, providing technical advice relating to the operation of computers in the fields of cyber-security and information technology, troubleshooting in the nature of discovery and diagnosing of computer hardware and software problems, and troubleshooting in the nature of discovery and diagnosing of cyber-security and information technology problems; Platform as a service (PAAS) featuring computer software platforms for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems; Software as a service (SAAS) services featuring software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems; Infrastructure as a service, namely, hosting software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyberattack identification and verification systems, and security analysis systems; Providing temporary use of on-line non-downloadable cloud computing software for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyberattack identification and verification systems, and security analysis systems; Cloud computing services, namely, providing temporary use of non-downloadable cloud-based operating software platform for use in designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, managing, hosting, and providing access to cyber-security systems, information technology systems for others, cyber-attack identification and verification systems, and security analysis systems |