Microsoft company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

microsoft.com

Founded Year

1975

Stage

IPO | IPO

Date of IPO

3/13/1986

Market Cap

2177.03B

Stock Price

293.47

About Microsoft

Microsoft (NASDAQ: MSFT) provides, develops, and licenses consumer and enterprise software. The company develops, manufactures, and sells computer software, consumer electronics, and personal computers and services. It is known for its Windows operating systems, Office productivity suite, cloud-based Azure platforms, and many more. The company was founded in 1975 and is based in Redmond, Washington.

Microsoft Headquarters Location

One Microsoft Way

Redmond, Washington, 98052,

United States

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Microsoft

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Microsoft is included in 6 Expert Collections, including E-Commerce.

E

E-Commerce

22 items

F

Fortune 500 Investor list

590 items

This is a collection of investors named in the 2019 Fortune 500 list of companies. All CB Insights profiles for active investment arms of a Fortune 500 company are included.

C

Conference Exhibitors

6,062 items

Companies that will be exhibiting at CES 2018

S

Smart Cities

2,351 items

Smart building tech covers energy management/HVAC tech, occupancy/security tech, connectivity/IoT tech, construction materials, robotics use in buildings, and the metaverse/virtual buildings.

T

The Edge Computing Landscape

456 items

Edge computing companies facilitate workload deployment in addition to providing data processing and storage at the farthest reaches of the network. These edge computing companies range from data centers at the edge to workload management tools designed to orchestrate edge deploy

M

Medical Devices

3,699 items

https://www.advamed.org/membership-join/membership-directory/ - excludes those without working websites.

Microsoft Patents

Microsoft has filed 10000 patents.

The 3 most popular patent topics include:

  • Data management
  • Social networking services
  • Diagrams
patents chart

Application Date

Grant Date

Title

Related Topics

Status

3/15/2019

8/9/2022

Network file systems, Cryptocurrencies, Data management, Identity management, Blockchains

Grant

Application Date

3/15/2019

Grant Date

8/9/2022

Title

Related Topics

Network file systems, Cryptocurrencies, Data management, Identity management, Blockchains

Status

Grant

Latest Microsoft News

Microsoft warns about SEABORGIUM phishing attack that befriends you first to rob you later

Aug 16, 2022

Neowin The Microsoft Threat Intelligence Center (MSTIC) has put out a warning about a phishing campaign dubbed "SEABORGIUM". Although not new as it has been around since at least 2017, Microsoft feels it has observed enough of SEABORGIUM and the ways it operates to put out a comprehensive guidance that could help potential victims avoid it. The dangerous thing about the campaign is the way the threat actors begin the attack. At first, they have been seen to conduct reconnaissance or thorough observation of the potential victims using fraudulent social media profiles. Several email addresses are also created to impersonate real IDs of authentic persons to contact the targets. Below is an example of a recent email sent out by the threat actors to the targets in order gain trust and build rapport: After that, Microsoft says that the SEABORGIUM actors delivers malicious URLs directly in an email or via attachments as you can see below, often imitating hosting services like Microsoft's own OneDrive: For example, here is an example (below) of an attachment that has no preview available which can allure targets into clicking on the malicious link that directs the victims to the phishing portals: Microsoft has noted the use of the EvilGinx phishing kit in this case used to steal the credentials of victims. The image below shows the phishing portal designed by SEABORGIUM to deceive victims into stealing their login information. In this overall SEABORGIUM campaign, Microsoft has mainly observed data exfiltration and information operation. The Redmond giant has explained the impact of the former in detail: Data exfiltration and impact Exfiltration of intelligence data: SEABORGIUM has been observed exfiltrating emails and attachments from the inbox of victims. Setup of persistent data collection: In limited cases, SEABORGIUM has been observed setting up forwarding rules from victim inboxes to actor-controlled dead drop accounts where the actor has long-term access to collected data. On more than one occasion, we have observed that the actors were able to access mailing-list data for sensitive groups, such as those frequented by former intelligence officials, and maintain a collection of information from the mailing-list for follow-on targeting and exfiltration. Access to people of interest: There have been several cases where SEABORGIUM has been observed using their impersonation accounts to facilitate dialog with specific people of interest and, as a result, were included in conversations, sometimes unwittingly, involving multiple parties. The nature of the conversations identified during investigations by Microsoft demonstrates potentially sensitive information being shared that could provide intelligence value. You can find more details in the official blog post on Microsoft's site here . Tags

Microsoft Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Microsoft Rank

  • When was Microsoft founded?

    Microsoft was founded in 1975.

  • Where is Microsoft's headquarters?

    Microsoft's headquarters is located at One Microsoft Way, Redmond.

  • What is Microsoft's latest funding round?

    Microsoft's latest funding round is IPO.

  • Who are Microsoft's competitors?

    Competitors of Microsoft include Built, Miradore, Trustworthy, McAfee, Trinsic, Observable, Kevel, Grammarly, Cybereason, Copado and 23 more.

You May Also Like

Tanium Logo
Tanium

Tanium gives enterprises and government organizations the ability to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of endpoints across the enterprise, retrieve data on their current and historical state, and execute change as necessary.

Automox Logo
Automox

Automox provides a cloud-based endpoint management solution designed to completely automate the patching, configuration, and maintenance of Windows, OS X, and Linux endpoints from a single platform. Endpoint management is a massive problem for IT organizations, complicated by different operating systems, software, device types, and geographic locations. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint, regardless of location, meets regulatory and security requirements.

Cybereason Logo
Cybereason

Cybereason develops software that aims to better track the actions of would-be cyber attackers. The Cybereason automated platform collects subtle clues by learning to discern anomalies and distinguish between the benign and pernicious. This data is then analyzed using Big data algorithms and proprietary knowledge enriched with external intelligence.

McAfee Logo
McAfee

McAfee is a security technology company, headquartered in Santa Clara, California, and delivers proactive and proven solutions and services that secure systems and networks.On March 1st, 2022, McAfee was acquired by an investor group led by Advent International at a valuation of $14B.

Deep Instinct Logo
Deep Instinct

Deep Instinct applies a subset of artificial intelligence (AI), known as deep learning, to cybersecurity. The company has built a vast neural network that is trained on hundreds of millions of files. There are no human dependencies related to identifying and preventing cyber attacks. As a result, threats are detected >99% of the time, with a false positive rate <0.1%.

Morphisec Logo
Morphisec

Morphisec provides an Endpoint Threat Prevention product, delivering protection against the most advanced cyberattacks. The company's patented Moving Target Defense technology prevents threats such as APTs, zero-days, ransomware, evasive fileless attacks and web-borne exploits.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.