Palo Alto Networks, Inc.

United States of America


Create a watch for Palo Alto Networks, Inc.
Total IP 1,251
Total IP incl. subs 1,252 (+ 1 for subs)
Total IP Rank # 1,080
IP Activity Score 3.7/5.0    1,127
IP Activity Rank # 652
Stock Symbol
ISIN US6974351057
Market Cap. 127,600M  (USD)
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

1,091 30
4 18
88 12
8
 
Last Patent 2025 - Software-as-a-service usage moni...
First Patent 1994 - Remote smart filtering communica...
Last Trademark 2025 - PRISMA AIRS
First Trademark 2007 - PAN-OS

Subsidiaries

1 subsidiaries with IP (1 patents, 0 trademarks)

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2025 G/S Downloadable computer software for computer network security; Downloadable computer software for ...
G/S Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth...
G/S Downloadable computer software for computer network security; downloadable computer software for ...
G/S Software as a service (SAAS) services featuring software for use in computer network security; so...
Invention Beacon and threat intelligence based apt detection. Techniques for beacon and threat intelligenc...
Invention Software-as-a-service usage monitoring with secure browser or browser environment. A communicati...
Invention Secure browser synchronization across browser instances. A communications system for providing s...
Invention Combined machine learning and formal techniques for network traffic analysis. A system generates...
Invention Iot device identification by machine learning with time series behavioral and statistical feature...
Invention Iot application learning. A system and method for performing automated learning of an Internet-o...
Invention Iot security policy on a firewall. Techniques for enforcing policies on Internet of Things (IoT)...
Invention Multi-model based account/product sequence recommender. To automatically identify a sequence of ...
Invention Auto generating build time policies from run time policies for shift left security. Comprehensiv...
Invention Iot policy recommendation large language model (llm) embeddings based global behavior learning. ...
Invention Distributed traffic steering and enforcement for security solutions. In some embodiments, a syst...
Invention Providing identity protection. Techniques for providing identity protection are disclosed. A sys...
Invention Application identification for phishing detection. Techniques for application identification for...
Invention Probing for cobalt strike teamserver detection. Techniques for probing for Cobalt Strike TeamSer...
Invention Flow metadata exchanges between network and security functions for a security service. In some e...
Invention Application precedence based traffic policy enforcement. Assigning priority values to applicatio...
Invention Context-based security in mobile networks using an api and a data store. Techniques for applying...
Invention Remote attack surface discovery and management. Techniques for identifying and managing an organ...
G/S Providing temporary use of online non-downloadable cloud native software application protection p...
2024 Invention Detection of replacement/copy-paste attacks through monitoring and classifying api function invoc...
Invention Cross protocol malware traffic detection using a two-layer ml architecture. A system, method, and...
Invention Threat intelligence dialogue system for interfacing with a proprietary threat intelligence databa...
Invention Multiple data center compatible deployment of applications matching a wildcard domain name. A net...
Invention Automated code signature generation for windows.net binaries. Various embodiments provide a syste...
Invention Browser isolation. A method for securing browsing activity of a user using user equipment (UE) h...
G/S Software as a service (SAAS) services featuring software using artificial intelligence for the mo...
G/S Software as a service (SAAS) services featuring software using artificial intelligence for the m...
Invention Interworking of stun and alg. Techniques for interworking of STUN and application-layer gateway ...
Invention Reduced overhead storage bloat prevention in edge caching systems. A cache manager tracks activi...
Invention Authentication token with proof of possession for gp proxy support. A method, system, and device...
Invention Benign network entities based malicious campaign signature generation. A signature generator has...
Invention Context-based policy mapping for security compliance. A policy mapping module maintains and dist...
Invention Combined inline cache purging and periodic hard purging in a cache server. A cache server mainta...
Invention Adaptive rate limiter based on transactional heuristics and artificial intelligence. A system, m...
Invention Large language model (llm) powered detection reasoning solution. Various techniques for LLM powe...
2023 Invention Automated service worker installation for client-initiated user identification and dlp scanning. ...
Invention Enhanced internal host detection protocol. Techniques for an enhanced internal host detection pr...
Invention Cross protocol malware traffic detection using a two-layer ml architecture. A system, method, an...
Invention Context-based sensitive message detection. A context-based chat message data loss prevention sys...
Invention Route adaptive intelligent traffic offloading. A host with a firewall and an offload device can ...
Invention Multi-factor authentication fatigue attack detection and blocking. An MFA fatigue attack detecto...
Invention Global search of a security related data store using natural language processing. Techniques for...
Invention Machine learning system for multi-domain long document clustering. A model pipeline has been cre...
Invention Cloud firewall configuration management using graph data model. A system, method, and device for...
Invention Real-time attribution of tools and campaigns for dns tunneling traffic. Various embodiments prov...
Invention Multiple data center compatible deployment of applications matching a wildcard domain name. A ne...
Invention Security rule conversion and performance evaluation. A cybersecurity rule conversion system (“co...
Invention Real time coaching and prevention of human-centric security vulnerabilities. The disclosed syste...
Invention Context-based cyberattack signature generation with large language models. A context-based cyber...
Invention Application programming interface intent based behavior summarization. A generative artificial i...
Invention Automated satellite device authentication to a portal for secure remote access. Techniques for a...
Invention Watermarking. A method of controlling access to a digital resource of a group of digital resourc...
2022 G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and...
G/S Providing information, analytics and statistics about commodities for use in the field of financ...
G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ...
G/S Providing on-line non-downloadable software for data mining, connecting with internet protocol ad...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patt...
G/S Promoting best practices and providing consumer information related to cybersecurity threat intel...
G/S Promoting best practices and consumer information related to cybersecurity threat intelligence a...
G/S Providing temporary use of non-downloadable software for autonomous threat detection, collection,...
2021 G/S Monitoring of computer systems for security purposes.
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network route...
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network rout...
G/S Consumer network security devices, namely, firewalls, routers, wifi hotspots, and mesh networks ...
G/S Providing nondownloadable instructional materials and guidelines in the field of computer softwar...
G/S Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ...
2020 G/S Computer hardware, namely, firewalls and network security devices; downloadable computer security...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer softwar...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer software...
G/S Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t...
G/S Downloadable computer software for monitoring, managing and securing computer systems and network...
2019 G/S Computer hardware, namely, firewalls and networks security devices; computer software for compute...
G/S Downloadable computer software for computer network security, namely downloadable computer securi...
G/S Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits...
G/S Providing a database featuring information, analytics and statistics about commodities for use i...
G/S downloadable computer software for computer network security technical support services, namely, ...
G/S Technological consultation in the field of computer networking and network security, excluding te...