42 Cloud computing featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; Software as a Service (SaaS) services featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior