2024
|
G/S
|
Providing online non-downloadable software that utilizes machine learning in the field of cyberse... |
|
G/S
|
Computer services for evaluating communications, including email and messages, and relational ite... |
|
Invention
|
Ingesting, standardizing, and analyzing digital activity information for detecting threats. Intro... |
|
Invention
|
Approaches to learning behavioral norms through an analysis of digital activities performed acros... |
|
Invention
|
Approaches to ingesting information regarding digital activities performed across different servi... |
|
Invention
|
Approaches to documenting and visualizing indications of risk discovered through an analysis of d... |
|
Invention
|
Approaches to ascertaining behavioral deviations based on an analysis of multiple digital activit... |
|
Invention
|
Adaptive detection of security threats through training of computer-implemented models.
A genera... |
|
Invention
|
Multistage analysis of emails to identify security threats.
Access to emails delivered to an emp... |
|
Invention
|
Abuse mailbox for facilitating discovery, investigation, and analysis of email-based threats.
It... |
2023
|
Invention
|
Threat detection platforms for detecting, characterizing, and remediating email-based threats in ... |
|
Invention
|
Detection and prevention of external fraud.
Techniques for detecting instances of external fraud... |
2022
|
Invention
|
Url rewriting. Selectively rewriting URLs is disclosed. An indication is received that a message ... |
|
Invention
|
Deriving and surfacing insights regarding security threats. Deriving and surfacing insights regar... |
|
Invention
|
Federated database for establishing and tracking risk of interactions with third parties.
Introd... |
|
Invention
|
Investigation of threats using queryable records of behavior.
Techniques for producing records o... |
|
Invention
|
Detection and prevention of external fraud. Techniques for detecting instances of external fraud ... |
|
Invention
|
Adaptive detection of security threats through retraining of computer-implemented models. Adaptin... |
|
Invention
|
Multichannel threat detection for protecting against account compromise. Techniques for building,... |
|
Invention
|
Multi-tiered approach to payload detection for incoming communications. A plurality of features a... |
|
Invention
|
Discovering email account compromise through assessments of digital activities. Introduced here a... |
|
Invention
|
Discovering graymail through real-time analysis of incoming email. Techniques for identifying and... |
|
G/S
|
Non-downloadable software that utilizes machine learning in the field of cybersecurity; non-downl... |
|
G/S
|
Non-downloadable software that utilizes machine learning in
the field of cybersecurity; non-down... |
|
G/S
|
Providing non-downloadable computer software that utilizes machine learning in the field of cyber... |
|
G/S
|
Providing non-downloadable computer software that utilizes
machine learning in the field of cybe... |
|
Invention
|
Multistage analysis of emails to identify security threats. Conventional email filtering services... |
2021
|
Invention
|
Abuse mailbox for facilitating discovery, investigation, and analysis of email-based threats. Int... |
|
G/S
|
Providing online non-downloadable software using artifical intelligence for machine learning in t... |
|
G/S
|
Providing online non-downloadable software using artificial intelligence for machine learning in ... |
|
Invention
|
Estimating risk posed by interacting with third parties through analysis of emails addressed to e... |
|
Invention
|
Approaches to creating, managing, and applying a federated database to establish risk posed by th... |
|
Invention
|
Retrospective learning of communication patterns by machine learning models for discovering abnor... |
|
Invention
|
Programmatic discovery, retrieval, and analysis of communications to identify abnormal communicat... |
|
Invention
|
Detection and prevention of external fraud. Introduced here are computer programs and computer-im... |
|
G/S
|
Computer services for evaluating email and relational items to identify fraudulent vendors and th... |
|
G/S
|
Computer services for evaluating email and relational items
to identify fraudulent individuals a... |
|
G/S
|
Computer services for evaluating email and relational items to identify fraudulent individuals an... |
|
G/S
|
Computer services for evaluating email and relational items
to identify fraudulent vendors and t... |
|
Invention
|
Investigation of threats using queryable records of behavior. Introduced here are computer progra... |
|
Invention
|
Improved investigation of threats using queryable records of behavior. Introduced here are comput... |
|
Invention
|
Multichannel threat detection for protecting against account compromise. Introduced here are comp... |
|
Invention
|
Federated database for establishing and tracking risk of interactions with third parties. Introdu... |
2019
|
G/S
|
Electronic mail (email) protection and security services, namely, on-line scanning, detecting, qu... |
|
G/S
|
Software for ensuring the security of electronic mail;
electronic mail and messaging software; c... |