42 Cloud computing featuring software for use in the communication, collaboration and reporting of technical product and service issues and for use in the requesting of support services; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, cloud hosting provider services; Computer services, namely, integration of private and public cloud computing environments; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting services in the field of cloud computing; Engineering services, particularly technical project planning and design engineering of lines for the processing of web products; Providing virtual computer systems and virtual computer environments through cloud computing; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, migration of datacenter, server and database applications; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support, namely, monitoring technological functions of computer network systems; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to networks, applications, databases, servers, and other information systems; Computer security threat analysis for protecting data; Computer consultation in the field of computer security; Maintenance of computer software relating to computer security and prevention of computer risks; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems