Computer security consultancy; Computer security threat analysis for protecting data; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Development of customized software for others for use in risk assessment, information security, computer security and security breach analysis; Application service provider featuring application programming interface (API) software and web interfaces for network security and vulnerability assessments, and for transmitting alerts to a log management system
Computer security consultancy; Computer security threat analysis for protecting data; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Development of customized software for others for use in risk assessment, information security, computer security and security breach analysis; Application service provider featuring application programming interface (API) software and web interfaces for network security and vulnerability assessments, and for transmitting alerts to a log management system
Computer security consultancy; Computer security threat analysis for p...