Full service information technology services, namely, outsource support service provider in the field of information technology services relating to installation, maintenance, and repair of computer hardware; full service information technology services, namely, outsource support service provider in the field of information technology services on a per project basis relating to installation, maintenance, and repair of computer hardware; full service information technology services, namely, outsource support service provider in the field of information technology services on an ongoing basis relating to installation, maintenance, and repair of computer hardware | Full service information technology services, namely, outsource support service provider in the field of information technology services relating to installation, maintenance, and repair of computer software; computer technology support services, namely, help desk services; computer and network security services, namely, implementation and management of security-related equipment, security-related software, and security-related computer systems designed for the purpose of restricting access to computer systems, computer networks, web sites, digital media, and facilities by unauthorized actors
Class 042: Information technology consulting services, namely, cloud strategy consulting and advisory services; Information technology consulting services, namely, evaluation of conventional information technology infrastructures; Information technology consulting services, namely, development of cloud implementation and migration strategies; Information technology consulting services, namely, implementation of cloud solutions; Information technology consulting services, namely, migration of existing information technology systems to cloud-based solutions; Technical support services, namely, providing infrastructure administration to aid in managing and securing cloud-based computing solutions for others; Information technology consulting services, namely, oversight of cloud-based solutions; Information technology consulting services in the nature of cloud computer security auditing services; Information technology consulting services, namely, penetration testing of cloud computers and remote networks to assess information security vulnerability
Installation of computer hardware for the creation of firewalls; "SECURE"; Information technology consulting in the nature of computer security auditing services; computer security services in the nature of penetration testing of computers and networks to assess information security vulnerability; installation of computer software for the creation of firewalls; computer security services in the nature of identifying and preventing phishing attacks
procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others; IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others
procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others; IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others
IT training services; procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others; "ENTERPRISE"; IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others
IT training services; procurement services, namely, the procurement of computer hardware and software for others; moving and relocation services, namely, administrative planning and implementing of the move of IT infrastructure equipment of businesses; providing virtual online office support staff for others; "TECHNOLOGIES"; IT consulting services; remote monitoring services, namely remote monitoring and management of computers and related peripheral and storage devices for purposes of identifying potential problems; computer and network security services, namely implementation and management of security-related equipment, software, and systems designed for the purpose of restricting access to and by computer networks to and of undesired computer networks to and of undesired websites, media, and individuals and facilities, review and remediation of security alerts generated by Security Event Information Management (SIEM) systems, conducting audits of information security systems, and performing penetration testing to identify potential information security vulnerabilities; off-site data backup services; remote computer backup services; computer co-location services, namely, providing facilities for the location of computer services with the equipment of others
Class 009: [ computer software, namely, enterprise software for managing the transmission and distribution of electronic files and electronic documents; computer programs for document management; computer programs use to control and capture data; client-server software, namely, computer network server software for managing the use and access to electronic documents on computer networks and global computer networks; computer software for document control, security, data encryption; computer software for transmitting, sharing, distributing, processing and printing electronic forms and documents and integrating of computerized forms in enterprise business workflow; computer programs for filling in and submitting forms on-line and offline and transferring electronic documents via computer networks, wireless networks and local or global communication networks; computer software for the collection, editing, organizing, transmission, storage and sharing of data and user information; computer software for delivery of electronic documents via networks; electronic publications, namely, user manuals and instructional books in the fields of computer software recorded on computer media ]; Class 042: providing temporary use of non-downloadable computer software for controlling and tracking documents over computer networks, intranet, and the Internet
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.