42 Computer security consultancy; designing custom comprehensive cybersecurity infrastructure for enterprise businesses and computer project management services related thereto; integration platform as a service (IPAAS) featuring computer software platforms for integrating, managing, implementing and optimizing computer network and cybersecurity infrastructure and applications; software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; computer security threat analysis for protecting data, namely, providing information updates on security threats to computer networks; providing a website featuring educational information in the field of computer security; providing security threat management services, namely, monitoring and tracking of security vulnerabilities and problems in computer software, the Internet, and computer networks; conducting computer network vulnerability assessments and testing to assess information security vulnerability; e-mail security services, namely, e-mail authentication services and filtering of unwanted e-mails; managed network access control, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, managing and monitoring computer infrastructure for others to ensure proper functioning; advanced engineering services to maintain the health of computer infrastructure; remote monitoring of computer infrastructure for security purposes delivered through security operations center; managed computer security services delivered through security operations centers, namely, optimizing computer security software in the nature of security information and event management (SIEM) software, firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC) software, data loss prevention (DLP) software, application security software, endpoint security software, and forensics and incident response software