42 Information and communications technology and cyber security vulnerability security assessment services; computer consulting services, namely, software data and code breach prevention, investigation and recovery services in the fields of information and communications technology and cyber security; computer services, namely, providing forensic services in the fields of information and communications technology and cyber security; computer security services, namely, scanning and penetration testing to assess information security vulnerability, enforcing, restricting, and controlling access privileges of users of computing resources based on assigned credentials, and restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials computer services, namely, data recovery services; computer programming services in the field of computer security, cyber security and computer network security; computer services, namely, auditing computer networks to ensure compliance with regulations; providing on-line non-downloadable software for indexing and making searchable data from any application, server or network device; cloud computing featuring software for indexing and making searchable data from any application, server or network device; software as a service (SAAS) services delivered on-demand or via cloud-based offering, featuring software for searching, monitoring, troubleshooting, providing operational intelligence and business analytics of client data; software as a service (SAAS) services delivered, on-demand or via cloud-based offering featuring software for accessing the results of client data; computerized identification verification services, namely, providing authentication of identification information for network access control and security management