9 Downloadable software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable software to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable software for securing communications between computers; downloadable software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable software for providing authentication of personal identification information; downloadable software for providing authentication for communications and transactions via a global computer network; downloadable software for identity verification and fraud detection and prevention; recorded software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; recorded software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; recorded software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; recorded software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; recorded software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; recorded software to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; recorded software for securing communications between computers; recorded software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; recorded software for providing authentication of personal identification information; recorded software for providing authentication for communications and transactions via a global computer network; recorded software for identity verification and fraud detection and prevention