42 Enterprise content management, namely, providing the use of online non-downloadable software for attack surface emulation within the business technology environments, research in the field of cybersecurity, technological consultancy in the field of cybersecurity, computer technology consultancy, specifically in the areas of cybersecurity risk management and the use of attack surface emulation for pre-empting, preventing, and continuous monitoring of vulnerabilities, computer security services, namely, restricting unauthorized network access and continuously validating the effectiveness of security controls, computer security system monitoring services, focusing on near real-time, automated emulation of attack surfaces to ensure system resilience, professional consulting services specializing in enterprise cybersecurity strategies, focusing on enhancing resilience against evolving cyber threats and ensuring robust protection for critical business assets, computer security threat analysis for protecting data, software as a service (SAAS) services featuring software for managing business technology risks, monitoring threats, and enhancing resilience, consultancy in the field of software as a service (SAAS), particularly related to cybersecurity and risk management, consulting services in the field of software as a service (SAAS), with a focus on protecting business technology environments, provision of computer security services, namely, enforcing, restricting, and controlling access privileges of users of computer networks, computer security consultancy in the field of scanning of computers and networks to assess information security vulnerabilities