Computer anti-virus software; "CYBER"; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices
Computer anti-virus software; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices
computer consultation for the defense industry and federal government agencies, namely, information technology consultation, and engineering services for others, in the fields of computer and network security, network architectural engineering, information architectural engineering, systems and software engineering, hardware engineering, logistics, and program management
Computer consultation, namely information technology consultation, and engineering services for others, in the fields of computer and network security, network architectural engineering, information architectural engineering, systems and software engineering, hardware engineering, logistics, and program management
hardware and software for rugged computers, namely, hardware and software used to enhance, protect, and integrate equipment and data for deployed and austere environments, namely, wide power ranges, night vision protection, ruggedization, and environmental hardening for computers, networking adapters, hard drives, peripherals, radios, heads-up or head mounted displays, global positioning systems, range finders, power systems, unmanned vehicles, target designators, environmental sensors, namely, temperature, humidity, shock, vibration, wind speed, inclination, human vital sign sensors, and weapons that may be used in deployed and austere environments; deployable computer and radio systems, namely, data encryption suites, network security suites, mission planning centers, satellite communications (SATCOM) and line of sight (LOS) radio suites, ground control stations and mobile data centers, all composed of hardware used to enhance, protect, and integrate equipment and data for deployed and austere environments; computer and network test and management tools, namely, test tools used to analyze, control, simulate, and trouble-shoot networks, network interfaces, and computer interfaces, namely, tools to test electrical signals and data flow across networks, computer cables and/or wireless mediums; management and control tools that filter, collect, or modify network or interface data; and web applications and integrated business solutions software, namely, enterprise resource planning business software for use in supply chain management, financial management, project management, human resources and customer relationship management; collaborative portal and workflow solutions software for use in the management of structured and unstructured data, configuration management, enterprise search, and information and knowledge classification and dissemination; geospatial software applications for use in gathering, storing, analyzing, integrating, and displaying geographic data sets; network security software for use in monitoring, detecting, analyzing, and protecting network assets; and virtualization software for use in server consolidation, secure remote computing, and application or service provisioning
Hardware and software for rugged computers, namely, hardware and software used to enhance, protect, and integrate equipment and data for deployed and austere environments, namely, wide power ranges, night vision protection, ruggedization, and environmental hardening for computers, networking adapters, hard drives, peripherals, radios, heads-up or head mounted displays, global positioning systems, range finders, power systems, unmanned vehicles, target designators, environmental sensors, namely, temperature, humidity, shock, vibration, wind speed, inclination, human vital sign sensors, and weapons that may be used in deployed and austere environments; deployable computer and radio systems, namely, data encryption suites, network security suites, mission planning centers, satellite communications (SATCOM) and line of sight (LOS) radio suites, ground control stations and mobile data centers, all composed of hardware used to enhance, protect, and integrate equipment and data for deployed and austere environments; computer and network test and management tools, namely, test tools used to analyze, control, simulate, and trouble-shoot networks, network interfaces, and computer interfaces, namely, tools to test electrical signals and data flow across networks, computer cables and/or wireless mediums; management and control tools that filter, collect, or modify network or interface data; and web applications and integrated business solutions software, namely, enterprise resource planning business software for use in supply chain management, financial management, project management, human resources and customer relationship management; collaborative portal and workflow solutions software for use in the management of structured and unstructured data, configuration management, enterprise search, and information and knowledge classification and dissemination; geospatial software applications for use in gathering, storing, analyzing, integrating, and displaying geographic data sets; network security software for use in monitoring, detecting, analyzing, and protecting network assets; and virtualization software for use in server consolidation, secure remote computing, and application or service provisioning
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of cyber security; Computer security services, namely, restricting unauthorized access to computer servers and networks; Computer security services, namely, restricting unauthorized network access by unauthorized persons; Computer security threat analysis for protecting data; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks
Network radio gateway appliance and software supporting radio over Internet protocol (RoIP) for specialized Government use; Interoperable communication appliance and software designed to provide audio, streaming video and data, VoIP phone, and access to Internet protocol (IP) devices such as routers, switches, and other network gateway devices that enhance network communications interoperability
Computer consultation, namely information technology consultation, and engineering services for others, in the fields of computer and network security, network architectural engineering, information architectural engineering, systems and software engineering, hardware engineering, logistics, and program management
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.