Publication Registration: |
Wednesday, November 7, 2018 |
Goods and Services Information
|
Description:
|
(1) - Computer hardware or software for monitoring, analyzing, summarizing, filtering, altering, or reporting network traffic; computer hardware or software for detecting, reporting, blocking, or eliminating malicious network traffic, viruses, worms, malware, spyware, unauthorized software and network attacks; computer hardware or software for providing digital security; computer hardware or software for use in cybersecurity, forensics, monitoring, compliance, or threat response; computer peripherals.
(2) - Provisioning and maintenance of computer software relating to computer security and prevention of computer risks; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems or improving performance; computer security services; monitoring the computer systems of others for technological purposes and providing backup computer programs and facilities; providing virtual computer systems and virtual computer environments through cloud computing.
(3) - Computer hardware and software for monitoring, analyzing, summarizing, filtering, altering, and reporting network traffic; computer hardware and software for detecting, reporting, blocking, and eliminating malicious network traffic, viruses, worms, malware, spyware, unauthorized software and network attacks; computer hardware and software for providing digital security; computer hardware and software for use in cybersecurity, forensic analysis, computer systems monitoring, assure compliance with computer network security laws and regulations, and computer network security response; computer peripherals, namely, computer keyboards and mouse.
(4) - Provisioning and maintenance of computer software relating to computer security and prevention of computer risks; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems and improving performance; computer security consultancy; monitoring of computer systems by remote access and providing computer disaster recovery services and hosting online web facilities for others; providing virtual reality security software through cloud computing web hosting services.
(5) - Computer hardware and software for monitoring, analyzing, summarizing, filtering, altering, and reporting network traffic; computer hardware and software for detecting, reporting, blocking, and eliminating malicious network traffic, viruses, worms, malware, spyware, unauthorized software and network attacks; computer hardware and software for providing digital security; computer hardware and software for use in cybersecurity, forensic analysis, computer systems monitoring, assure compliance with computer network security laws and regulations, and computer network security response; computer peripherals, namely, computer keyboards and mouse.
(6) - Provisioning and maintenance of computer software relating to computer security and prevention of computer risks; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems and improving performance; computer security consultancy; monitoring of computer systems by remote access and providing computer disaster recovery services and hosting online web facilities for others; providing virtual reality security software through cloud computing web hosting services.
|