42 Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote management of information technology (IT) systems of others comprised of computer network and server hardware, software, data, smartphones, tablet computers, laptop computers, desktop computers and software applications therefor; Computer services, namely, on-site management of information technology (IT) systems of others comprised of computer network and server hardware, software, data, smartphones, tablet computers, laptop computers, desktop computers and software applications therefor; Monitoring of computer systems for detecting unauthorized access or data breach