42
Providing non-downloadable computer software that utilizes
machine learning in the field of cybersecurity; providing
non-downloadable computer software that utilizes machine
learning to determine the normal communication behavior of
individuals to identify unusual communication behavior;
computer services for analyzing digital activities to
discover security threats; computer services for analyzing
digital communications occurring across email and messaging
platforms to discover security threats; security services,
namely, online scanning, detecting, quarantining, and
eliminating of viruses, worms, trojans, spyware, adware,
malware, social engineering based instructions and exploits,
and unauthorized data and programs from digital
communications including emails and messages; security
services, namely, monitoring, detecting, and remediating
instances of account takeover; software as a service (SaaS)
featuring software for the analysis and protection of
digital activities, communications, and accounts; platform
as a service (PaaS) featuring software-implemented platforms
for the analysis and protection of digital activities,
communications, and accounts; email and messaging management
services for others, namely, threat protection in the nature
of monitoring computing systems to detect unauthorized
access, data breach, and data exfiltration and storing
digital communications recorded in electronic media;
software as a service (SaaS) featuring software for the
analysis and protection of the security of network
communications, cybersecurity, email management virus
protection, email archiving, email continuity, and email
security; computer security consultancy; computer services
for evaluating emails to identify fraudulent individuals and
entities, such as vendors, and then monitoring conduct of
those fraudulent individuals and entities on an ongoing
basis; computer services for recording behaviors of
individuals and entities deemed to be fraudulent in a
blacklist for security purposes; computer services for
tracking digital activities of individuals and entities
determined to be fraudulent based on an analysis of emails
sent by those individuals and entities; computer services
for generating a federated collection of individuals and
entities to prevent security threats Intent to Use: the
applicant has a bona fide intention, and is entitled, to use
the mark in commerce on or in connection with the identified
goods/services (term considered too vague by the
International Bureau - Rule 13 (2) (b) of the Regulations)