42 Software as a service (SaaS) services featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Cloud computing featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) services featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Cloud computing featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Software as a service (SaaS) services featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Software as a service (SaaS) services featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Software as a service (SaaS) services featuring software for user identity and access authentication; Cloud computing featuring software for user identity and access authentication; Software as a service (SaaS) services featuring software for providing computer and mobile device user identity authentication via a mobile application; Cloud computing featuring software for providing computer and mobile device user identity authentication via a mobile application; Software as a service (SaaS) services featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Cloud computing featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Cloud computing featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing a host data bank computer; Cloud computing featuring a non-predictable code calculator for accessing a host data bank computer; Software as a service (SaaS) services featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources; Cloud computing featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources