9
Computer software, namely, local network security software; analysis software for detecting and tracing unauthorized access to computer networks; computer network analysis and optimization software
35
Outsourcing in the field of information system forensics
41
Computer education training in the fields of information and network security operations
42
Computer and information technology consulting; consulting services in the field of information security; integration of computer systems and networks; installation of computer software; consulting about the deployment, configuration, installation and updating of computer software; consulting about auditing and analyzing computer networks of others and assessing network security needs; monitoring security systems; remote and onsite monitoring of computer systems; monitoring the computer systems of others and providing backup of computer programs and facilities; managing network violation incidents, namely, responding to incidents of violations, conducting internal investigations and preparing incident reports