42 Software as a service (SAAS) services featuring post quantum cryptographic (PQC) software for providing secure, cryptographic identity authentication and cryptographic access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to secured data, managed workspaces and privileged access management, software applications, secure websites, and post-quantum cryptography (PQC) cloud, mobile and network resources; Post- quantum cryptography (PQC) cloud computing featuring software for providing post-quantum cryptography (PQC) secure identity authentication and post-quantum cryptography (PQC) secure access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and post-quantum cryptography (PQC) cloud, mobile and network resources; Post-quantum cryptography (PQC) software as a service (SAAS) services featuring post-quantum cryptography (PQC) software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Post-quantum cryptography (PQC) cloud computing featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Post-quantum cryptography (PQC) software as a service (SAAS) services featuring software for providing risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, post-quantum cryptography (PQC) software as a service and secure post-quantum cryptography (PQC) cloud, and secure mobile and network resources; Post- quantum cryptography (PQC) cloud computing featuring software for providing risk analytics in connection with management of cryptographically-unique user identity authentication and secure access privileges of users to data, software applications, websites, SaaS software as a service and secure post-quantum cryptography (PQC) cloud, and secure mobile and network resources; Post- quantum cryptography (PQC) software as a service (SAAS) services featuring software for management of cryptographic user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Post-quantum cryptography (PQC) cloud computing featuring software for management of cryptographically-unique user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and secure access certification; Post-quantum cryptography (PQC) software as a service (SAAS) services featuring software for securing user identity and providing secure access authentication; Post- quantum cryptography (PQC) cloud computing featuring software for securing cryptographically-unique user identity and securing access authentication; Software as a service (SAAS) services featuring software for providing computer and secure mobile device user identity authentication via a mobile application; Post-quantum cryptography (PQC) cloud computing featuring cryptographic software for providing secure computer and secure mobile device user identity authentication via an encrypted mobile application; Post-quantum cryptography (PQC) software as a service (SAAS) services featuring post-quantum cryptography (PQC) software used by an authorized user of a secure computer system, computer network, website, computer resource, or computer software to authenticate user identity; Post-quantum cryptography (PQC) cloud computing featuring software used by a cryptographically authorized user of a computer system, secure computer network, website, computer resource, or computer software to authenticate user identity; Post-quantum cryptography (PQC) software as a service (SAAS) services featuring software with a non-predictable cryptographic code calculator for accessing secure computer networks, websites, computer software, and computer resources; Post-quantum cryptography (PQC) cloud computing featuring software with a non- predictable cryptographic code calculator for accessing computer networks, websites, computer software, and computer resources; Post-quantum cryptography (PQC) software as a service (SAAS) services featuring software with a non-predictable code calculator for accessing a hosted secure server; Post-quantum cryptography (PQC) cloud computing featuring software with a non-predictable cryptographic code calculator for accessing a host data bank computer; Software as a service (SAAS) services featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and PQC cloud, mobile and network resources; Post-quantum cryptography (PQC) cloud computing featuring software for calculating the probable authenticity of computer or mobile device cryptographically-generated user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and post-quantum cryptography (PQC) cloud, mobile and network resources