Cyber incident prevention and response services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems and providing incident response recovery and restoration services for computer systems that have been improperly accessed by unauthorized users; cybersecurity risk management consulting services, namely, technology consultation in the field of cybersecurity; cybersecurity risk assessment services, namely, technology consultation in the field of cybersecurity; cybersecurity testing services, namely, testing of computer software and hardware; cybersecurity threat analysis for protecting systems, data, and notification of related cybersecurity events and alerts, namely, technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; technical advisory services relating to computer security, cybersecurity, data compliance, and data breaches; consulting services in the field of critical incident response to information, computer, and internet security breaches, namely, technology consultation in the field of cybersecurity; advisory services related to the preparation of quality standards in the field of information technology [IT]; testing, analysis and evaluation services relating to the application of industry standards in the field of information technology [IT]; information technology IT consulting in the field of cybersecurity, data privacy, data protection, data recovery, information technology security and risk assessment and compliance; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerability, incident response, policies, awareness and training, due diligence reviews, and social engineering; cybersecurity services in the nature of restricting unauthorized access to computer systems.
Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security services, namely, providing secure network access in the nature of restricting and controlling access privileges of users of computing resources based on assigned credentials for the purposes of mitigating cybersecurity risks; computer services, namely, unauthorized user and unauthorized software intrusion detection and protection; computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of computer network access, computer viruses, and computer security threats; computer services, namely, data recovery services; computer services, namely, detection of computer viruses and computer security threats; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; development, updating, and maintenance of software for networks and standalone computers in the fields of security, and anti-virus protection and monitoring; cybersecurity services in the nature of restricting unauthorized access to computer systems; monitoring of computer systems for detecting unauthorized access or data breach, and to ensure proper functioning; software as a service (SaaS) featuring network security software; software as a service (SaaS) featuring software for data protection and data security; monitoring of computer systems and databases for security purposes in the nature of protecting data and information from unauthorized access; computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of computer network access or activity in the nature of protecting data and information from unauthorized access; providing authentication services via online non-downloadable software for establishing and transmitting security credentials between computers; Maintenance of computer software relating to computer security and prevention of computer risks; Providing software technology that enables users to track, monitor and locate pets via a website; Computer services, namely, creating, maintaining, designing, and implementing websites for others to enable users to locate, monitor, and track the position of personal property; providing technology information in the field of wearable technological products for users to locate, monitor, and track personal property; providing software technology that enables users to locate, monitor, and track personal property via a website; temporary provision of non-downloadable computer software relating to location specific-information for disaster prevention and emergency disaster response; monitoring of computer systems for security purposes; monitoring of environmental sensors in homes, businesses, and other facilities for disaster detection, prevention, and warning; none of the aforesaid software services being in relation to vehicles or transportation related use except for software services used in connection with consumer electronic goods designed for use in connection with vehicles as an extension of a security or automation system for dwellings and commercial buildings.
Cyber incident prevention and response services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems and providing incident response recovery and restoration services for computer systems that have been improperly accessed by unauthorized users; cybersecurity risk management consulting services, namely, technology consultation in the field of cybersecurity; cybersecurity risk assessment services, namely, technology consultation in the field of cybersecurity; cybersecurity testing services, namely, testing of computer software and hardware; cybersecurity threat analysis for protecting systems, data, and notification of related cybersecurity events and alerts, namely, technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; technical advisory services relating to computer security, cybersecurity, data compliance, and data breaches; consulting services in the field of critical incident response to information, computer, and internet security breaches, namely, technology consultation in the field of cybersecurity; information technology [IT] consulting in the field of cybersecurity, data privacy, data protection, data recovery, information technology security and risk assessment and compliance; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess security vulnerability, incident response, policies, awareness and training, due diligence reviews, and social engineering; cybersecurity services in the nature of restricting unauthorized access to computer systems.
Cyber security services; design, development, programming, installation, maintenance and updating of software; application service provider, namely, hosting, managing, developing, analysing, updating and maintaining applications, computer operating systems, software, and web sites for others; computer support services (programming and software installation, repair and maintenance services); monitoring of computer systems for security purposes; computer security services (design and development of secure computer hardware, software and systems); computer security services (programming and software installation repair and maintenance services); computer security services (testing and risk assessment of computer networks); data security services (firewalls); security assessment services for computer networks and systems; security assessment services for computer networks including risk assessment; computer assurance, security, and auditing services; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; providing online non-downloadable software, namely, analytical tools for raising threat alerts; computer virus, malware and spyware protection services; cryptanalysis services; data cryptology services; data encryption services; recovery of computer data; forensic analysis of computer data and computer operating systems; analytical services relating to computers, computer networks and communications networks; electronic data storage; computer services, namely, recovering and/or analysing data from computer data storage devices; computer services, namely, detecting, recovering, and securing computer data evidence for use in digital forensics; software services relating to cyber security, cyber risk management, cyberattacks, cyber safety, and protecting systems, networks, and programs from digital attacks; rental of computer software, data processing equipment and computer peripheral devices; cloud computing; providing virtual computer systems through cloud computing; server hosting; hosting of databases; web portal services (designing or hosting); design, development, and hosting of websites; electronic and computerised data storage; data mining services; computer software engineering; computer security engineering; computer software programming services; hosting platforms on the Internet; programming of software for information platforms on the Internet; application service provider (ASP) services; software as a service [SaaS]; platform as a service [PaaS]; digital forensic investigations relating to cyber security, cyber risk management, cyberattacks, cyber safety, and protecting systems, networks, and programs from digital attacks; consulting services in the field of digital forensics, incident response, managed detection and response, and professional cyber security services including testing, assessments, and technical advisory; research in the fields of cyber security, detection, and response technology; computer security consultancy in the field of monitoring, scanning, and penetration testing of computers and networks to assess information and security; computer diagnostic services; computer support services (design and development of computer hardware, software and peripherals); computer support services (programming and software installation, repair and maintenance services); information technology (IT) services (computer hardware, software and peripherals design and technical consultancy); online technical computer support (testing in the field of computers, computer software and computer systems); online technical computer support (troubleshooting and consulting services in the fields of repairing and maintaining computer software); computer services, namely, computer system administration for others; computer services, namely, remote management of the information technology (IT) systems of others; preparation of technological reports; providing on-line support services for computer software users; information, consultancy and advisory services, including online, in relation to all of the aforementioned services