Activity
-
Thank you, John. And thank you for everything you have done for Pax8. I am incredibly humbled and to say that I am excited for this opportunity…
Thank you, John. And thank you for everything you have done for Pax8. I am incredibly humbled and to say that I am excited for this opportunity…
Shared by Scott Chasin
Patents
-
Marking electronic messages to indicate human origination
Issued United States 9,015,472
Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.
-
Bounce management in a trusted communication network
Issued United States 8,738,708
An embodiment of a method handles bounced messages in a private network processing hub that is configured to handle messages submitted by a plurality of member networks that are registered with the private network processing hub, and wherein the private network processing hub and the plurality of member networks form a private network. The method may include receiving a first message from a member network or from an unregistered network within the private network processing hub, and determining…
An embodiment of a method handles bounced messages in a private network processing hub that is configured to handle messages submitted by a plurality of member networks that are registered with the private network processing hub, and wherein the private network processing hub and the plurality of member networks form a private network. The method may include receiving a first message from a member network or from an unregistered network within the private network processing hub, and determining whether the first message is a bounced message generated in response to an original message sent by the private network processing hub by searching the first message for a tracking identifier that was generated by the private network processing hub and inserted into the original message. The determining operation may include searching for the tracking identifier among a plurality of stored tracking identifiers.
-
Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse
Issued United States 8,484,295
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow…
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts.
-
Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
Issued United States 7,680,890
Systems and methods for classifying e-mail messages as spam by combining outputs of a plurality of spam classifiers or classification tools using a fuzzy logic voting algorithm or formula are provided. According to one embodiment, a first classification value associated with an e-mail message and a second classification value associated with the e-mail message are received. The first classification value and the second classification value being indicative of whether the e-mail message is spam.…
Systems and methods for classifying e-mail messages as spam by combining outputs of a plurality of spam classifiers or classification tools using a fuzzy logic voting algorithm or formula are provided. According to one embodiment, a first classification value associated with an e-mail message and a second classification value associated with the e-mail message are received. The first classification value and the second classification value being indicative of whether the e-mail message is spam. Then, a single, aggregated classification value for the e-mail message is generated by combining the first classification value and the second classification value using a fuzzy logic-based voting mechanism.
-
Stopping and remediating outbound messaging abuse
Issued United States 7,953,814
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow…
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.
-
Electronic message forwarding system
Issued United States 5,937,161
A telecommunications system (100) includes a service provider node (116) that is capable of forwarding electronic mail messages addressed to a user of the service provider node. The forwarding process is controlled by a message transfer agent (202), a subscriber database analyzer (204), a queue directory (206), and a message queue agent (208). The subscriber database analyzer performs a comparison between data that the user has provided and the message content. The subscriber database causes…
A telecommunications system (100) includes a service provider node (116) that is capable of forwarding electronic mail messages addressed to a user of the service provider node. The forwarding process is controlled by a message transfer agent (202), a subscriber database analyzer (204), a queue directory (206), and a message queue agent (208). The subscriber database analyzer performs a comparison between data that the user has provided and the message content. The subscriber database causes the message queue agent to forward the message to a user-defined telecommunications address based upon the message content and the results of the comparison.
More activity by Scott
It is my pleasure to announce the acquisition of Bam Boom Cloud. In addition to an amazing team led by Vicky Critchley our partner ecosystem is…
Liked by Scott Chasin
Today is one of the most exciting days of my entire career. 😆 Our goal at Bam Boom has always been to scale our Microsoft Dynamics solutions…
Liked by Scott Chasin
I am very excited to introduce our newest employee, a wingman who needs no introduction ROB RAE! Rob is our CVP of Community and Ecosystems and has…
Liked by Scott Chasin
🚀I'm excited to join CrowdStrike as Chief Business Officer! CrowdStrike is positioned to continue leading the cybersecurity market from the front…
Liked by Scott Chasin
Happy New Year! 🌟 When I look back on 2022, these highlights come to mind: 💰 Raising $185 million in financing in March, valuing the company at…
Liked by Scott Chasin
What a great moment for Pax8! Big congrats to all our employees and partners that have contributed to our success.
Shared by Scott Chasin
For MSPs, delivering a cloud-first security solution portfolio is a massive opportunity for growth and is already becoming the foundational component…
Shared by Scott Chasin
Pax8 is hosting a massive security bootcamp this week (18th & 19th) in partnership with Microsoft. And on that note, we are already deep into Cyber…
Shared by Scott Chasin
SMB cyber risks continue to grow. The risks aren’t just disruptive, they can be fatal. https://lnkd.in/ejVuZTvM
Shared by Scott Chasin
Pax8 continues to simplify and expand the cloud journey for our MSP partners and their customers around the world. Cloud networking is…
Shared by Scott Chasin
For 5️⃣ consecutive years, Pax8 has appeared on the Inc. Magazine 5000 list! 🚀 Fewer than 5️⃣% of companies who make the list maintain growth rates…
Liked by Scott Chasin
Optimize with Pax8. https://lnkd.in/ezZY_yCv
Shared by Scott Chasin
We did it - 5 years in a row on the Inc. Magazine 5000. 🎉 Pax8 continues to exemplify rocketship growth. Our success can be credited to our people,…
Shared by Scott Chasin
Verizon's excellent breach report for 2022 is now out. Not a surprise that ransomware is up considerably (13%) and that social engineering…
Shared by Scott Chasin
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Scott Chasin
3 others named Scott Chasin are on LinkedIn
See others named Scott Chasin