42
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability and validate compliance with applicable regulations and industry standards; computer services, namely, online-line external and internal network scanning, detecting, quarantining and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs from the computer networks; design of computer hardware, integrated circuits, communications hardware and software and computer networks for others; back-up services for computer hard drive data; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; technical support, namely, providing back-up computer programs and facilities; remote computer backup services, namely, redundancy, dial-up back-up, high speed back-up and secure wireless back-up; design, deployment and management of wireless networks for others; design and development of wireless computer networks; computer services, namely, on-line scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; update of computer software to meet and respond to current threats, standards and industry changes; technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; computer technology support services, namely, help desk services, including online tool for allowing others to monitor and manage their networks and sites; application service provider (ASP), namely, hosting computer software applications of others; hosting of digital content on the internet. hosting the web sites of others on a computer server for a global computer network; computer software design for others and computer software customization; planning, design and management of information technology systems for public and private use; design and development of electronic data security systems applications; computer security consultation, namely, consultation concerning risk assessments and risk management strategies; computer virus protection and data encryption services designed to reduce security exposure, increase data integrity and confidentiality; computer network design for others, namely, designing for virtual private networks; updating of computer software relating to computer security and prevention of computer risks; computer services, namely, disaster recovery of data and software applications