42 Computer services, namely, remote and on-site management of information technology systems and networks for others; modernization of information technology systems and networks, namely, updating of computer software; computer systems integration services, namely, hardware and software integration planning, development, and implementation, on information technology systems and networks; installation of software on information technology systems and networks; design and development of electronic data security systems, namely, developing and implementing electronic data security systems, for information technology systems and networks; Installation, maintenance and repair of computer software; Computer network configuration services; Cloud storage services for electronic data; Computer disaster recovery planning; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer technology support services, namely, help desk services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Computer network design for others; Computer and network security services, namely, restricting unauthorized access for computer networks; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Development of security systems and contingency planning for information systems; Internet security consultancy; IT consulting services; IT consulting services in the field of cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data, communications and endpoints; IT integration service; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software, namely, security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention, application security, endpoint security, and forensics and incident response; Managed firewall and SIEM solutions, namely, computer security consultancy services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Computer security consultancy, namely, security assessment services for computer networks; Computer security consultancy, namely, security risk assessment relating to computer and network systems; Computer services, namely, computer system administration for others; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Data security consultancy; Technology consultation in the field of cybersecurity; Computer security consultancy, namely, consulting in the field of signals intelligence; Technical consulting in the field of computer security in the nature of signals intelligence collection, analysis and dissemination; Computer services, namely, remote and on-site management of the information technology (IT) systems of others, namely, management of secure information technology (IT) based services for others in the nature of information technology (IT) software applications management, enterprise services management in the nature of management of software applications, information assurance management in the nature of management of restricting network, data, and information access and management of scanning and eliminating unauthorized data and programs from files and networks and cyber security management in the nature of maintenance of computer software relating to computer security and prevention of computer risks; Technical support in the field of computer network security, namely, monitoring technological functions of computer network systems for detecting unauthorized use of network data; Technical support services for computer security purposes, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer network security services, namely, scanning and penetration testing of computer networks to assess information security vulnerability; Monitoring of computer networks for security purposes, namely, restricting unauthorized access to computer networks; Computer security services, namely, protecting data and information in computer networks from unauthorized access; Computer security services in the nature of administering digital keys; Computer security services in the nature of administering digital certificates; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, restricting unauthorized access to computer networks; Security assessments and security solutions services, namely, computer security threat analysis for protecting data and computer security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others; Consulting services in the field of security intelligence, namely, computer security consultancy Consulting services in the field of national security, namely, computer security consultancy; Computer security services for protecting data and information from unauthorized access, namely, monitoring of computer systems for computer security purposes, for compliance with federal agency and federal department regulations and guidelines, and for compliance with computer security guidelines, and for security risk assessment purposes; National intelligence services, namely, cyber threat analysis being computer security threat analysis for protecting data