42 Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Cloud computing featuring software for use in managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, cloud hosting provider services; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, cloud hosting provider services; Providing a website featuring non-downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, network security devices, computer systems, computer networks, servers, the Internet, and mobile devices; Providing a website featuring non-downloadable software for managing on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing a website featuring non-downloadable software for managing accounts, licenses, permissions, and configuration of computer hardware and computer software for others; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems