42
Computer services for evaluating email and relational items
to identify fraudulent vendors and then monitoring conduct
of those fraudulent vendors on an ongoing basis; computer
services for recording behaviors of vendors deemed to be
fraudulent in a blacklist for security purposes; computer
services for tracking digital activities of vendors
determined to be fraudulent based on an analysis of emails
sent by those vendors; computer services for generating a
federated collection of vendor behaviors to prevent security
threats; computer services for generating a federated
blacklist of vendors and associated behaviors to prevent
fraud; computer services for creating, populating, and
managing blacklists of vendors determined to be security
threats due to involvement in past digital activities;
computer services for analyzing digital activities to
discover security threats; computer services for analyzing
digital communications occurring across email and messaging
platforms to discover security threats; security services,
namely, online scanning, detecting, quarantining, and
eliminating of viruses, worms, trojans, spyware, adware,
malware, social engineering based instructions and exploits,
and unauthorized data and programs from digital
communications including emails and messages; security
services, namely, monitoring, detecting, and remediating
instances of account takeover; software as a service (SaaS)
featuring software for the analysis and protection of
digital activities, communications, and accounts; platform
as a service (PaaS) featuring software-implemented platforms
for the analysis and protection of digital activities,
communications, and accounts; email and messaging management
services for others, namely, threat protection in the nature
of monitoring computing systems to detect unauthorized
access, data breach, and data exfiltration and storing
digital communications recorded in electronic media;
software as a service (SaaS) featuring software for the
analysis and protection of the security of network
communications, cybersecurity, email management virus
protection, email archiving, email continuity, and email
security; computer security consultancy