Goods and Services Information
|
Description:
|
(1) - Downloadable computer software for network security assessment and testing; downloadable computer software for information security analysis, namely, forensic and auditing software used to determine security weakness in software and software applications; downloadable electronic fraud and identity theft protection computer software; downloadable software for online fraud protection, namely, providing safe browsing to users in e-commerce transactions, online financial transactions and online communications; downloadable software for identifying and authenticating users in e-commerce transactions, online financial transactions and online communications; recorded computer software for fraud protection by providing safe browsing to users in e-commerce transactions, online financial transactions and online communications, recorded on a usb flash drive; downloadable computer software in the field of data security for secure network access, data and software security, encryption; downloadable content compliance and governance computer software, namely, downloadable enterprise test management software to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies; downloadable computer software for providing document, data and information security, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; recorded computer software for computer network security and accessing computer networks; downloadable computer software for verifying and correcting web-sites to meet federal accessibility standards software for use in data security for secure network access, data and software security, encryption, content compliance and governance; recorded computer software for use in compliance management and risk analysis in the fields of computer and network security; downloadable software for integrating and allowing for communication between electronic fraud, identify theft protection, unauthorized access detection, and policy and decisioning software systems.
(2) - Educational services, namely, providing training in the use of software in the field of data security.
(3) - Software as a service (saas) featuring software in the fields of data security for secure network access, data and software security, encryption, and content compliance and governance; providing temporary use of an online non-downloadable software application featuring enterprise test management software that enables companies to create and manage organizational standards and policies for web site quality, accessibility, privacy, usability, searchability and custom quality factors and to verify compliance with such organizational standards and policies; providing temporary use of online non-downloadable software for securing documents, data, and information, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; software as a service (saas) services, namely, hosting software for use by others for use securing documents, data and information, protection of documents, data and information, and encryption of documents, data and information, and restriction and tracking of access to documents, data and information; evaluation of computer systems, namely, analysis of internal computer systems, extranet computer systems and global computer network systems, for others; implementing computer software systems for others; designing, developing, implementing and monitoring computer networks and computer systems for others; computer and network monitoring services, namely, monitoring technological functions of websites and computer network systems for others, load balancing of servers, and computer network security services in the nature of enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, scanning and penetration testing of computers and networks to assess information security vulnerability, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; providing temporary use of online, non-downloadable software for accessing and using a cloud computing network; software as a service (saas), namely, hosting software applications for others in the fields of information technology (it) systems and information security management; application service provider (asp) services, namely, hosting computer software applications of others; consulting services in the field of software as a service (saas); technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and internet services; providing temporary use of online, providing temporary use of online non-downloadable computer software for compliance management and risk analysis in the fields of computer and network security; providing temporary use of online non-downloadable network security software; providing temporary use of online non-downloadable identity verification software; providing temporary use of online non-downloadable network auditing software in the fields of secure communications and data networks; computer consultation in the nature of consultation about the maintenance and updating of computer software and computer technology consultancy and providing technical consulting information in the field of internet and network security and secure transmission of data and information; technical consulting services in the field of electronic storage and archiving of data for others; infrastructure as a service (iaas), namely, providing remotely accessible storage capacity in the nature of electronic storage of data; technical support services, namely, remote administration and management of virtual infrastructure storage; storage services for archiving of electronic data; providing a website featuring information in the field of electronic data storage products and services; computer security serv
|