42 Computer security consultancy; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; providing on-line, non-downloadable software for enforcing data policies in the field of network security, data security, and computer security; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable software for ensuring compliance in the field of network security, data security, and computer security; providing on-line, non-downloadable software for use in filtering Internet content; software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; platform as a service (PAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials