35
Business consulting services relating to the use and integration of technology to protect computer and internet information
42
Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities and enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials for the purpose of threat detection; computer security response services, namely, emergency response services for computer security systems and computer network technology; computer security consultation services in the field of protecting computer and internet information; computer systems integration services for the purpose of protecting computer and internet information; computer consultation in the field of computer and network security; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Consulting services in the field of maintaining the security and integrity of databases
45
Security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, network devices, databases and applications