42 (Based on Intent to Use) Computer disaster recovery planning; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer technology consultancy in the field of disaster mitigation, namely, the development of computer disaster mitigation strategies in the event of a natural disaster; Data security consultancy; Internet security consultancy; Providing on-line non-downloadable software for use in analyzing and benchmarking cybersecurity risk; Providing temporary use of non-downloadable cloud-based software for updating of computer software relating to computer security and prevention of computer risks; Technology consultation in the field of cybersecurity(Based on 44(d) Priority Application) Computer disaster recovery planning; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer technology consultancy in the field of disaster mitigation, namely, the development of computer disaster mitigation strategies in the event of a natural disaster; Data security consultancy; Internet security consultancy; Providing on-line non-downloadable software for use in analyzing and benchmarking cybersecurity risk; Providing temporary use of non-downloadable cloud-based software for updating of computer software relating to computer security and prevention of computer risks; Technology consultation in the field of cybersecurity