42 Monitoring of computer systems for detecting unauthorized access or data breach; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Data security consultancy; Design and development of electronic data security systems; Design and implementation of software and technology solutions for the purpose of product and document authentication and tracking, and brand monitoring and protection, to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Internet-based service for the secure electronic storage of multi-lingual documents featuring an ability to track and report all user interactions with the service; Providing a website featuring technology enabling users to remotely view, monitor, program, operate and control large and small appliances, electrical systems and security systems in homes, offices and vehicles; Providing technology information updates for home security systems via the global computer network; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Updating of computer software relating to computer security and prevention of computer risks