42 Software namely, software as a service (SAAS) services featuring software for use in managing public key infrastructure (PKI) operations, public key certificates and cryptographic keys; software namely, software as a service (SAAS) services featuring software for use in managing digital identities used for data and device authentication, data encryption, and secure communication of internet connected devices; software namely, software as a service (SAAS) services featuring software for designing, deploying, and managing secure public key infrastructure (PKI) for internet connected systems; software namely, software as a service (SAAS) services featuring software for software for adding security to the use of a mobile device management (MDM) system utilizing simple certificate enrollment protocol (SCEP) with an enterprise public key infrastructure (PKI); software namely, software as a service (SAAS) services featuring computer software for authenticating, issuing, and validating digital certificates in the nature of adding security to the use of a mobile device management (MDM) system utilizing simple certificate enrollment protocol (SCEP) with an enterprise public key infrastructure (PKI); providing information on computer network security consultancy; software namely, software as a service (SAAS) services featuring software for identity and access management for computer networks; software namely, software as a service (SAAS) services featuring software for assessing readiness for public key infrastructure (PKI) in internet connected systems; software namely, software as a service (SAAS) services featuring software for reviewing public key infrastructure (PKI) of internet connected systems; software design and software development services; software namely, software as a service (SAAS) services featuring software for data control and security of cloud computing environments, product and document authentication, device authentication, data encryption, secure communication management and data validation; computer security consultancy services; computer security threat analysis