42 Computer security threat analysis for protecting data; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer technology support services, namely, help desk services; Data security consultancy; Information technology consulting services; Internet security consultancy; Technical support services, namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; Computer services, namely, remote management of information technology (IT) systems of others comprised of networks, servers, workstations, and software applications; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, on-site management of information technology (IT) systems of others comprised of networks, servers, workstations, and software applications; Computer services, namely, remote management of the information technology (IT) systems of others; Consulting in the field of information technology; Outsource service provider in the field of information technology consulting; Outsource service providers in the field of information technology; Planning, design and management of information technology systems; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, troubleshooting of industrial process control computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Technical support, namely, providing backup computer programs and facilities