35
Business management services, namely, providing outsource management services to others in the field of network security validation and compliance; preparation of customized business reports for others
36
Credit card processing services; providing electronic processing of credit card transactions and electronic payments via a global computer network
38
Providing private and secure real time electronic communication over a computer network; communication services, namely, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks
42
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability and validate compliance with applicable regulations and industry standards; computer services, namely, online-line external and internal network scanning, detecting, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs from the computer networks; design of computer hardware, integrated circuits, communications hardware and software and computer networks for others; back-up services for computer hard drive data; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; technical support, namely, providing back-up computer programs and facilities; remote computer backup services, namely, redundancy, dial-up back-up, high speed back-up and secure wireless back-up; design, deployment and management of wireless networks for others; design and development of wireless computer networks; computer services, namely, on-line scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; update of computer software to meet and respond to current threats, standards and industry changes; technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; computer technology support services, namely, help desk services, including online tool for allowing others to monitor and manage their networks and sites; application service provider (ASP), namely, hosting computer software applications of others; hosting of digital content on the internet; hosting the web sites of others on a computer server for a global computer network; computer software design for others and computer software customization; planning, design and management of information technology systems for public and private use; design and development of electronic data security systems applications; computer security consultation, namely, consultation concerning risk assessments and risk management strategies; computer virus protection and data encryption services designed to reduce security exposure, increase data integrity and confidentiality; computer network design for others, namely, designing virtual private networks; updating of computer software relating to computer security and prevention of computer risks; computer services, namely, disaster recovery of data and software applications; providing secure wireless back-up of computer data for others
45
Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity which typically indicate problems such as theft, wrongdoing, training issues, or customer service issues; providing user authentication services in e-commerce transactions; authentication and issuance of digital certificates