2024
|
G/S
|
Computer services, namely, computer system administration for others; Cybersecurity services in t... |
|
G/S
|
Software as a service (SAAS) services featuring software using artificial intelligence (AI) for i... |
|
G/S
|
Providing on-line non-downloadable software for use in behavioral analytics; Software as a servic... |
|
G/S
|
Downloadable computer software for browser security, cyber threat detection, secure and safe brow... |
|
Invention
|
Focused image grabbing.
A method includes monitoring user activities at an endpoint device on a ... |
|
Invention
|
Dynamically controlling access to linked content in electronic communications.
Aspects of the di... |
|
Invention
|
Managing and routing of endpoint telemetry using realms.
A computer network includes user endpoi... |
|
Invention
|
Determining authenticity of reported user action in cybersecurity risk assessment.
An electronic... |
|
Invention
|
System and method for improving detection of bad content by analyzing reported content.
Systems,... |
|
Invention
|
System and method for scalable file filtering using wildcards.
A system monitors access to a com... |
|
Invention
|
Message management platform for performing impersonation analysis & detection.
Aspects of the di... |
|
Invention
|
Using a machine learning system to process a corpus of documents associated with a user to determ... |
|
Invention
|
Intelligent clustering systems and methods useful for domain protection.
An intelligent clusteri... |
|
Invention
|
Detecting random and/or algorithmically-generated character sequences in domain names.
Aspects o... |
|
Invention
|
Identifying threat similarity using forensics clustering.
Systems, methods and products for iden... |
|
Invention
|
Misdirected email data loss prevention.
Aspects of the disclosure relate to data loss prevention... |
|
Invention
|
Systems and methods for location threat monitoring.
Disclosed is a new location threat monitorin... |
|
Invention
|
Methods and systems for people centric data discovery.
Systems and methods for data discovery wi... |
|
Invention
|
Methods and system for context-preserving sensitive data anonymization.
Systems and methods for ... |
|
Invention
|
Systems and methods for in-process url condemnation.
A universal resource locator (URL) collider... |
|
Invention
|
Domain name processing systems and methods.
A domain processing system is enhanced with a first-... |
|
Invention
|
Detecting and protecting against cybersecurity attacks using unprintable tracking characters.
As... |
|
Invention
|
Identifying legitimate websites to remove false positives from domain discovery analysis.
Aspect... |
|
Invention
|
Bulk messaging detection and enforcement. Aspects of the disclosure relate to providing commercia... |
|
Invention
|
Generating simulated spear phishing messages and customized cybersecurity training modules using ... |
|
Invention
|
Uniform resource locator classifier and visual comparison platform for malicious site detection. ... |
|
Invention
|
System and method for identifying cyberthreats from unstructured social media content.
A cyberth... |
|
Invention
|
Processing external messages using a secure email relay.
Aspects of the disclosure relate to pro... |
2023
|
Invention
|
Systems and methods for prioritizing url review for sandboxing based on accelerated velocities of... |
|
Invention
|
Using neural networks to process forensics and generate threat intelligence information.
Aspects... |
|
Invention
|
Secure url shortener for character-limited messages.
Aspects of the disclosure relate to providi... |
|
Invention
|
Data enrichment systems and methods for abbreviated domain name classification.
To find enrichin... |
|
Invention
|
Prompting users to annotate simulated phishing emails in cybersecurity training. Aspects of the d... |
|
Invention
|
Dynamic message analysis platform for enhanced enterprise security.
Aspects of the disclosure re... |
|
Invention
|
Domain name classification systems and methods.
Disclosed is a domain engineering analysis solut... |
|
Invention
|
Using signed tokens to verify short message service (sms) message bodies. Aspects of the disclosu... |
|
Invention
|
Neural network host platform for detecting anomalies in cybersecurity modules.
Aspects of the di... |
|
G/S
|
Downloadable software for use in the field of cybersecurity Online non-downloadable software for ... |
|
Invention
|
Dynamic message analysis platform for enhanced enterprise security. Aspects of the disclosure rel... |
|
Invention
|
Detection and prevention of fraudulent activity on social media accounts.
Technology is disclose... |
|
Invention
|
Systems and methods for ip mass host verification.
Systems, methods, and products for identifyin... |
|
Invention
|
Systems and methods for in-process url condemnation. A universal resource locator (URL) collider ... |
|
Invention
|
Simulated phishing lure generation using artificial intelligence for improved cybersecurity.
Asp... |
|
Invention
|
Content-based socially-engineered threat classifier. Threat detection systems and methods in whic... |
|
Invention
|
System and method for light data file upload prevention. A system preventing upload of a source f... |
|
Invention
|
Document open detection and remediation. A computer system detects whether a new document has bee... |
2022
|
Invention
|
Systems and methods for promissory image classification. Systems, methods and products for classi... |
|
Invention
|
Machine learning uniform resource locator (url) classifier. Aspects of the disclosure relate to U... |
|
Invention
|
Content-based socially-engineered threat classifier.
Threat detection systems and methods in whi... |
2021
|
Invention
|
Data enrichment systems and methods for abbreviated domain name classification. To find enriching... |
|
G/S
|
Online non-downloadable software that aggregates and correlates threat data points across email, ... |
|
Invention
|
Identifying threat similarity using forensics clustering. Systems, methods and products for ident... |
2020
|
G/S
|
Providing private and secure real time electronic communication over cloud based computer network... |
2019
|
G/S
|
Computer software, namely, a software interface to identify, analyze and facilitate action agains... |
2018
|
G/S
|
Software as a service, namely, a software interface to identify, analyze and facilitate action ag... |
2017
|
G/S
|
Computer software for searching, detecting, blocking, filtering, tagging, compiling, indexing, an... |
2016
|
G/S
|
Computer security software for searching, detecting, blocking, filtering, tagging, compiling, ind... |
|
G/S
|
Software as a service, namely, a software interface to navigate threat intelligence, run threat a... |
2015
|
G/S
|
downloadable computer software and computer programs for cyber security training and reporting pu... |
|
G/S
|
cloud based software as a service (SAAS) services featuring software for cyber security training ... |
2014
|
G/S
|
Technical support, namely, monitoring technological functions of computer network systems, namely... |
2013
|
G/S
|
computer services, namely, providing information updates relating to computer security and preven... |
2009
|
G/S
|
Computer software that is provided to clients to allow them to leverage data processing services ... |
2006
|
G/S
|
Computer software for detecting, filtering, monitoring, reporting, blocking, removing and prevent... |
2004
|
G/S
|
Computer software for detecting, filtering, monitoring, reporting, blocking, removing, and preven... |
2003
|
G/S
|
computer software for detecting, filtering, monitoring, reporting, blocking, removing, and preven... |
|
G/S
|
Computer software for the analysis and classification of information over and in information netw... |
1998
|
G/S
|
Computer software, namely, electronic mail transfer agent (MTA) and message storing system softwa... |