42 File protection services, namely, back-up services for computer hard drive and cloud data; data warehousing; remote computer backup services; remote online backup of computer and cloud data; software as a service (SAAS) services featuring software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; Providing temporary use of non-downloadable cloud-based software for monitoring files and properties of files; Providing temporary use of non-downloadable cloud-based software for analyzing file properties and determining if file properties have changed; Providing temporary use of non-downloadable cloud-based software for creating reports regarding properties of files and changes in the properties of files; Data encryption services, Data encryption and decoding services; Computer services, namely, encrypted data recovery and data security services in the nature of data security consultancy and computer security threat analysis for protecting data; Providing temporary use of non-downloadable computer software for litigation hold and electronic discovery; Cross-platform conversion of digital content into other forms of digital content; Providing temporary use of non-downloadable computer software for identifying when files have been moved to removable media or cloud-based applications or storage; Providing temporary use of non-downloadable computer software for creating audit trails relating to file properties; Providing temporary use of non-downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; Providing temporary use of non-downloadable computer software for tracking and identifying unusual activity relating digital content and files; Providing temporary use of non-downloadable computer software for analyzing file properties and generating file property reports; Providing temporary use of non-downloadable computer software for tracking, identifying, searching, and reporting on file activity data; Software as a service (SAAS) services featuring software for data security and for assistance and support in the prevention of unauthorized network data exfiltration on computers, computer systems, computer networks and digital devices; Software as a service (SAAS) services featuring software for computer system, corporate cloud and email risk detection; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; data security consulting services in the fields of information risk management and computer data security; technical consulting services related to designing, developing, customizing, configuring, deploying, analyzing, and managing of data security systems for others; Computer security consultancy in the field of insider threat management, in the nature of insider risk monitoring and reduction; Computer security consultancy in the nature of advanced cybersecurity services featuring the application and implementation of techniques, tools and expertise to detect, investigate and remediate advanced persistent threats and insider threats and include offensive cyber capabilities