42
Outsource service providers in the field of information
technology; technical advice relating to operation of
computers; technical support services; 24/7 monitoring of
network systems, servers and web and database applications
and notification of related events and alerts; remote and
on-site infrastructure management services for monitoring,
administration and management of public and private cloud
computing IT and application systems; troubleshooting of
computer software problems; monitoring technological
functions of computer network systems; computer programming
services for the protection of software; data security
services; computer software technical support services;
installation, maintenance and repair of computer software;
computer security consultancy; computer software consulting
services; computer technology consulting services; computer
security consultancy services; consultancy in the design and
development of computer hardware; computer software,
hardware, firmware, network, and computer security
consulting services; providing on-line, non-downloadable
software for use in managing, monitoring, protecting,
authenticating, and securing data, endpoints, computer
systems, computer networks, servers, the Internet, and
mobile devices; providing on-line, non-downloadable software
for enforcing data policies; providing on-line,
non-downloadable software for encryption; providing on-line,
non-downloadable computer compliance software; providing
on-line, non-downloadable software for use in Internet
content filtering, secure Internet content management,
Internet content-checking, and data content checking;
software as a service (SAAS) services featuring software for
use in managing, monitoring, protecting, authenticating, and
securing data, endpoints, computer systems, computer
networks, servers, the Internet, and mobile devices;
software as a service (SAAS) services featuring software for
securing users, and security policies; software as a service
(SAAS) services featuring software for visualizing users,
security policies, computer systems, computer networks, and
traffic flow; software as a service (SAAS) services
featuring software for detecting anomalies of users,
security policies, computer systems, and computer networks;
software as a service (SAAS) services featuring software for
automated monitoring of users, security policies, computer
systems, and computer networks; software as a service (SAAS)
services featuring software for providing security and
compliance reports about users, security policies, computer
systems, and computer networks; software as a service (SAAS)
services featuring software for network asset inventory
management; software as a service (SAAS) services featuring
software for conducting security and compliance assessments;
software as a service (SAAS) services featuring software for
enforcing, restricting and controlling access privileges of
users; software as a service (SAAS) services featuring
software for computer network and computer system security;
platform as a service (PAAS) services featuring software for
use in managing, monitoring, protecting, authenticating, and
securing data, endpoints, computer systems, computer
networks, servers, the Internet, and mobile devices; cloud
computing featuring software for use in managing,
monitoring, protecting, authenticating, and securing data,
endpoints, computer systems, computer networks, servers, the
Internet, and mobile devices; computer development services;
computer programming services; computer virus protection
services; computer security services by way of notification
of unauthorized electronic messages and related computer
attacks; computer security services; computer security
services in the nature of enforcing, restricting and
controlling access privileges of users of computing
resources for cloud, mobile or network resources based on
assigned credentials; providing information on data
security, and computer security; troubleshooting of computer
software problems; technical advice related to computer and
computer network security; monitoring of computer systems
for security purposes; 24/7 monitoring of servers and web
and database applications and notification of related events
and alerts; remote and on-site services for monitoring,
administration and management of public and private cloud
computing and application computing systems; computer
security consultancy; providing on-line, non-downloadable
software for use in managing, monitoring, protecting,
authenticating, and securing data, endpoints, computer
systems, servers, the Internet, and mobile devices;
providing on-line, non-downloadable software for enforcing
data policies; providing on-line, non-downloadable computer
compliance software; providing on-line, non-downloadable
software for use in Internet content filtering, secure
Internet content management, Internet content-checking, and
data content checking; software as a service (SAAS) services
featuring software for use in managing, monitoring,
protecting, authenticating, and securing data, endpoints,
computer systems, servers, the Internet, and mobile devices;
software as a service (SAAS) services featuring software for
securing users, and security policies; software as a service
(SAAS) services featuring software for visualizing users,
security policies, computer systems, and traffic flow;
software as a service (SAAS) services featuring software for
detecting anomalies of users, security policies, and
computer systems; software as a service (SAAS) services
featuring software for automated monitoring of users,
security policies, and computer systems; software as a
service (SAAS) services featuring software for providing
security and compliance reports about users, security
policies, and computer systems; software as a service (SAAS)
services featuring software for asset inventory management;
software as a service (SAAS) services featuring software for
conducting security and compliance assessments; software as
a service (SAAS) services featuring software for enforcing,
restricting and controlling access privileges of users;
computer virus protection services; computer security
services in the nature of enforcing, restricting and
controlling access privileges of users of computing
resources based on assigned credentials; providing
information on data security and computer security;
monitoring of computer systems for security purposes