9 Downloadable software and software applications for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, router and gateway protection, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software applications for Internet content filtering; downloadable software platforms for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for use of virtual private networks (VPN); downloadable software for protection against fraud and identity thefts; downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable USB operating software; downloadable software and downloadable software device drivers for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; wireless devices in the nature of mobile hotspot devices, mobile phones, laptops and tablet computers; downloadable computer application software for use in implementing the Internet of Things (IoT); downloadable computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable software and computer applications for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable or integrable embedded software for use in implementing cyber security solutions for the Internet of Things (IoT)