Goods and Services | Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving vendors to identify security threats; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors, namely, monitoring digital communications involving vendors determined to be fraudulent to identify security threats; Computer services for generating a federated collection of vendor behaviors to prevent security threats, namely, identifying and cataloging vendor behaviors through analysis of digital communications; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud, namely, establishing a federated blacklist by analyzing digital communications involving vendors; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of vendors for the purpose of identifying security threats; Computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy |