42 Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consultation services relating to computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Technical support services, namely, troubleshooting of computer software problems; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of cybersecurity protection; Computer security threat analysis for protecting data; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Data security consultancy; Design and development of computer software for cybersecurity protection, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Installation, maintenance and repair of computer software; Internet security consultancy