9 Recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials