42
Cloud data security services; cloud-based, cloud-stored and cloud-hosted data protection and security services; software and cyber web security services; software as a service (SaaS) services, namely, providing an on-line non-downloadable software platform for use in cloud data security; providing a non-downloadable cloud data security platform for use in assisting in the ability to visualize, analyze and optimize security processes; technical support services, namely providing technical advice in the fields of cloud data security and cybersecurity; software design and development in the field of cloud data security and cybersecurity; design, development and implementation of software in the field of could data security and cybersecurity; software as a service (SaaS) services, namely, providing an on-line non-downloadable software platform for use in the field of network security and internet security; platform as a service (PaaS) services featuring computer software platforms in the field of network security and internet security; software as a service (SaaS) services, namely, providing an on-line non-downloadable software platform featuring cloud-based software for security threat analysis and remediation; providing temporary use of non-downloadable software for the purpose of identifying, analyzing, tracking, monitoring and remediating security threats and vulnerabilities in computer software; providing computer security threat management services, namely, monitoring and tracking of security vulnerabilities and problems in computer software; providing temporary use of non-downloadable cloud-based software for the purpose of identifying, analyzing, tracking, monitoring and remediating security threats and vulnerabilities in computer software and computer networks; IT security services; computer and internet security services, namely, Software as a Service (SaaS) featuring software for identifying, measuring, anticipating, and mitigating cybersecurity risks through assessments that align with regulatory standards and compliance requirements, with user interfaces, dashboards, and reporting features in the nature of customized security reports detailing a user’s potential cybersecurity gaps and areas of improvement; software security services, namely, providing security, protection and restoration services; data security services, namely, providing security, protection and restoration; technical and computer consultation related to all the above