42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; backup services for computer hard drive data; computer consultation in the field of computer security; computer disaster recovery planning; computer network configuration services; computer network design for others; computer project management services; computer security consultancy; computer services, namely, cloud hosting provider services; computer services, namely, computer system administration for others; computer services, namely, on-site management of information technology (it) systems of others; computer services, namely, remote management of the information technology (it) systems of others; computer software installation and maintenance; computer technical support services, namely, 24/7 service desk or help desk services for it infrastructure, operating systems, database systems, and web applications; consulting in the field of information technology; consulting in the field of virtualization technologies for enterprises and businesses; consulting services in the field of cloud computing; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; consulting services in the field of hosting computer software applications; development of security systems and contingency planning for information systems; hosting the software, websites and other computer applications of others on a virtual private server; installation and maintenance of computer software; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems by remote access to ensure proper functioning; providing virtual computer systems and virtual computer environments through cloud computing; technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; computer services, namely, data recovery services; computer systems analysis; installation of computer software; integration of computer systems and networks; information technology audit services, namely, review and analysis of information technology systems; technical support, namely, monitoring technological functions of computer network systems; business technology software consultation services; computer services, namely, management of cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer services, namely, monitoring networks for malicious activity and exploits, stopping malicious activity and exploits, alerting network users and owners, and restoring or recovering normal network operations; computer services, namely, monitoring computer systems for malicious activity and exploits, stopping malicious activity and exploits, alerting network users and owners, and restoring or recovering normal system operations; computer services, namely, providing network threat protection services; managed security services, namely, network threat protection services