Computer and software security consulting services in the nature of investigative analytics operational intelligence analytic and threat intelligence analytics provided to governmental entities and business organizations in the fields of cyber security, network intelligence, web and social intelligence, unifying and analyzing intelligence data, surveillance of computer, telecommunication and digital networks to help such entities and organizations neutralize and prevent terror, crime and cyber threats; Cybersecurity services in the nature of protecting data and information from unauthorized access, and restricting access to computer systems; Data security consultancy; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Providing temporary use of online non-downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, unifying and analyzing intelligence data, surveillance of computer and telecommunication networks; All of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities.
Cellular, wireless, and mobility communication monitoring and management apparatus and instruments comprised of downloadable computer software and computer hardware for the purpose of identifying, controlling, detecting and locating wireless phones and handheld devices and targets using infrared mapping, extraction, intercepting and homing capabilities
Computer hardware and downloadable computer software for data integration and data fusion for use in the fields of decision intelligence, digital investigations and fraud detection; Computer hardware and downloadable computer software for use in the collection, retention, storage, analysis, dissemination and distribution of networked, mobile and wireless video, audio and data transmissions | Software as a service (SAAS) services featuring software for data integration and data fusion for use in the fields of decision intelligence, digital investigations and fraud detection; Software as a service (SAAS) services featuring software for use in the collection, retention, storage, analysis, dissemination and distribution of networked, mobile and wireless video, audio and data transmissions
Downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, and surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities; Computer and software security consulting services in the nature of investigative analytics operational intelligence analytic and threat intelligence analytics provided to governmental entities and business organizations in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer, telecommunication and digital networks to help such entities and organizations neutralize and prevent terror, crime and cyber threats; Cybersecurity services in the nature of protecting data and information from unauthorized access, and restricting access to computer systems; Data security consultancy; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Providing temporary use of online non-downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities
Downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, and surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities | Computer and software security consulting services in the nature of investigative analytics operational intelligence analytic and threat intelligence analytics provided to governmental entities and business organizations in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer, telecommunication and digital networks to help such entities and organizations neutralize and prevent terror, crime and cyber threats; Cybersecurity services in the nature of protecting data and information from unauthorized access, and restricting access to computer systems; Data security consultancy; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Providing temporary use of online non-downloadable security analytics computer programs and software in the nature of investigative analytics, operational intelligence analytics, and threat intelligence analytics software provided to governmental entities and business organizations for use in the fields of cyber security, network intelligence, web and social intelligence, situational intelligence, video security, unifying and analyzing intelligence data, surveillance of computer and telecommunication networks; all of the foregoing excluding those targeting the heavy asset industries, namely, oil and gas, energy, power and utilities (including renewables), cleantech, mining, real estate and process, discrete and batch manufacturing, manufacturing operations, and manufacturing facilities
Class 009: computer hardware and software for use in the fields of digital security, surveillance, and enterprise business intelligence for use in the collection, retention, storage, analysis, dissemination and distribution of networked, mobile and wireless video, audio and data transmissions, and instruction manuals and documentation, sold as a unit; Class 042: computer consulting services in the fields of digital security, surveillance and enterprise business intelligence
Downloadable computer programs and downloadable computer software all for use with connecting, controlling, analyzing and managing security devices, security sensors and data for rapid security response for governmental entities and business organizations | Computer software consulting and consulting services in the field of hosting software applications all for connecting, controlling, analyzing and managing security devices, security sensors and data for rapid security response for governmental entities and business organizations
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.