42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
computer security consultancy; consulting services in the field of cloud computing; providing on-line, non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; providing on-line, non-downloadable software for use in enforcing network security, data security, and computer security data policies; providing on-line, non-downloadable software for encryption; providing on-line, non-downloadable software for use in network security, data security, and computer security compliance; providing on-line, non-downloadable software for use in internet content filtering, secure internet content management, internet content checking, and data content checking; software as a service (saas) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; platform as a service (paas) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, emails, endpoints, computer systems, computer networks, servers, the internet, and mobile devices; technical support services, namely, monitoring of network systems, network servers and network devices and notification of related events and alerts; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials