42
Non-downloadable software that utilizes machine learning in
the field of cybersecurity; non-downloadable software that
utilizes machine learning to determine the normal
communication behavior of individuals to identify unusual
communication behavior; computer services for analyzing
digital activities to discover security threats; computer
services for analyzing digital communications occurring
across email and messaging platforms to discover security
threats; computer security services, namely, online
scanning, detecting, quarantining, and eliminating of
viruses, worms, trojans, spyware, adware, malware, social
engineering based instructions and exploits, and
unauthorized data and programs from digital communications
including emails and messages; computer security services,
namely, monitoring, detecting, and remediating instances of
account takeover; software as a service (saas) featuring
software for the analysis and protection of digital
activities, communications, and accounts; platform as a
service (paas) featuring software-implemented platforms for
the analysis and protection of digital activities,
communications, and accounts; design and development of
software for management of emails and messaging services
namely, threat protection in the nature of monitoring
computing systems to detect unauthorized access, data
breach, and data exfiltration and storing digital
communications recorded in electronic media; software as a
service (saas) featuring software for the analysis and
protection of the security of network communications,
cybersecurity, email management virus protection, email
archiving, email continuity, and email security; computer
security consultancy; computer security system monitoring
services for evaluating emails to identify fraudulent
individuals and entities, such as vendors, and then
monitoring conduct of those fraudulent individuals and
entities on an ongoing basis; computer services for securing
personal information for recording behaviors of individuals
and entities deemed to be fraudulent in a blacklist for
security purposes; identity validation services [computer
security] for tracking digital activities of individuals and
entities determined to be fraudulent based on an analysis of
emails sent by those individuals and entities; providing
security services for computer networks, computer access and
computerized transactions for generating a federated
collection of individuals and entities to prevent security
threats