38 Telecommunication services, in the form of the provision of security protocols for an online Application Service Provider and management enterprise software, namely, providing custom-configured authentication protocols to allow confidentiality of data, integrity of processed data availability of data to authenticated end users in the fields of manufacturing, services industries and government to facilitate access to programs in order to better serve and render efficient individual clients' project and infrastructure management and real-time support