42 Computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies in the field of network security, data security, and computer security; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable software for ensuring compliance in the field of network security, data security, and computer security; Providing on-line, non-downloadable software for use in filtering Internet content, for use in the secure management of Internet content featuring securing content against unauthorized intrusion attempts, the presence of viruses, spamware, spam, malware, malicious code, spyware, and adware, and for use in Internet content-checking and data content-checking in the nature of verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from Internet content and verifying the absence of viruses, spamware, spam, malware, malicious code, spyware, and adware from electronic data; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials