42 Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish software system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity