42 Technical support and consulting services in the fields of computer security, vulnerability of computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security software systems for others; Technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; Cloud computing services featuring online, non-downloadable software and databases for use in computer security and prevention and mitigation of computer risks; Computer consultation and research in the field of computer hardware, computer software and network security; Computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; Information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; Application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; Application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments