Goods and Services | Software as a service (SAAS) services featuring software for monitoring, managing, and facilitating secure access to electronically-stored information and ensuring that users follow established information security policies as a condition of receiving access to said electronically-stored information; Software as a service (SAAS) services featuring software for data security purposes by providing authentication; Platform as a Service (PaaS) services featuring computer software platforms for enabling and managing authentication and authorization of permitted individuals, computer software, and software-equipped devices to other computer software applications, cloud-based software, software-equipped devices, and digital information; Platform as a Service (PaaS) services featuring computer software platforms for use by others to enable and manage access by permitted individuals, computer software, and software-equipped devices to other computer software applications, cloud-based software, software-equipped devices, and digital information; Platform as a Service (PaaS) services featuring computer software platforms for authentication and authorization that enables the creation and management of user directories within the software platform, and that enables interoperability with external user directories; Platform as a Service (PaaS) services featuring computer software platforms that enable implementation and management of multi-factor authentication; Platform as a Service (PaaS) services featuring computer software platforms for authentication without use of a password, namely, through email authentication, SMS authentication, and mobile device authentication; Platform as a Service (PaaS) services featuring computer software platforms that provide anomaly protection for user and computer program authentication and authorization, namely, computer software that helps identify anomalies during the authentication and authorization processes; Computer software consulting; Computer network identification verification and authentication services, namely, user authentication services using blockchain and software technology for digital certificates, tokens, sessions, browser or website cookies and information in the nature of personal identification and credentials; Monitoring of computers for security purposes, namely, computer security services in the nature of restricting unathorized access to electronically stored data in computers, computer networks, computer software applications, websites, and mobile phones; Providing a website featuring information on computer privacy, computer security, and data governance, namely, the system of internal policies that organizations use to manage, access, and secure electronically stored data; Providing information in the field of digital security and user identity verification using software technology |