Sophos Limited

United Kingdom


Create a watch for Sophos Limited
Total IP 641
Total IP incl. subs 643 (+ 2 for subs)
Total IP Rank # 2,069
IP Activity Score 3.4/5.0    512
IP Activity Rank # 1,380
Parent Entity Sophos Holdings Limited
Dominant Nice Class Scientific and electric apparatu...

Patents

Trademarks

447 71
3 8
52 11
49
 
Last Patent 2025 - Firewall techniques for colored ...
First Patent 1994 - Validity checking
Last Trademark 2025 - CRYPTOGUARD
First Trademark 1994 - SOPHOS

Subsidiaries

1 subsidiaries with IP (0 patents, 2 trademarks)

1 subsidiaries without IP

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2025 Invention Cloud-based zero trust network access service. A cloud-based platform for zero trust network acc...
Invention Validation of ztna configuration for a multi-tenant proxy environment. A cloud-based platform fo...
G/S Anti-malware software; anti-virus software; anti-ransomware software; intrusion detection systems...
G/S Downloadable computer anti-virus software; Downloadable computer software for anti-malware, anti-...
Invention Deduplication of endpoint connections. In an enterprise network with a threat management facility...
Invention Augmented security recognition tasks. A system for conducting a security recognition task, the s...
Invention Methods and apparatus for natural language interface for constructing complex database queries. ...
Invention Compound threat detections in cloud computing environments. A graph of nodes is created represen...
Invention Rapid exposure detections in cloud computing environments. A log of resource modifications in a ...
Invention Tracking threat actors across cloud identities. A variety of techniques are used to locate and c...
Invention Detecting persistent attacks in cloud computing environments. An evidence table for threat data ...
G/S Downloadable computer anti-virus software; Computer hardware; Computer networking hardware; Downl...
G/S Computer software; Artificial intelligence software; machine learning software; threat detection ...
Invention Apparatus and methods for an application programming interface to detect and locate malware in me...
Invention Firewall techniques for colored objects on endpoints. An application executing on an endpoint ac...
Invention Malware mitigation based on runtime memory allocation. A compute instance is instrumented to det...
2024 Invention Realtime event detection. An event handler implements a state machine or similar construct for p...
Invention Misconfigured mirror port detection. A method includes monitoring a plurality of packets receive...
G/S Computer software; computer anti-adware software; computer anti-malware software; computer anti-s...
G/S Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg war...
Invention Domain name service protection for secure web gateway. A secure web gateway for a cloud computin...
Invention Cold start user activity anomaly detection in cloud computing environment. A system and method f...
Invention Firewall offloading. A firewall system provides two network paths for network flows: one path th...
Invention Methods and apparatus for visualization of machine learning malware detection models. Embodiment...
Invention Use of an application controller to monitor and control software file and application environment...
Invention Aggregating security events. A stream of events is received at a local security agent running on...
Invention Determining events that prevent processing of email messages. A computer-implemented method incl...
Invention Zero trust network access connector for customer premises. A zero trust network access (ZTNA) sy...
Invention Websocket server for cloud-based zero trust network access data plane. In order to efficiently m...
Invention Load balancing for cloud-based zero trust network access data plane. In a cloud-based data plane...
Invention Incremental enrichment of threat data. A threat management facility receives data from a variety...
Invention Streaming and filtering event objects into a data lake. An asynchronous stream of security event...
Invention Endpoint with remotely programmable data recorder. An endpoint coupled in a communicating relati...
Invention Secure firewall configurations. A kernel driver on an endpoint uses a process cache to provide a...
Invention Security integration for cloud services. A threat management facility for an enterprise network ...
Invention Rules processing system. A rule processing system uses rule objects that self-define contexts wh...
Invention Data augmentation for threat investigation in an enterprise network. An endpoint in an enterpris...
Invention Deduplication of endpoint connections. In an enterprise network with a threat management facilit...
Invention Managing untyped network traffic flows. An enterprise security system is improved by managing ne...
Invention Systems and methods for processing network communications. Systems and methods for processing an...
Invention Dynamic signature selection systems and methods. Systems and methods for detecting threats using...
Invention Configuring a monitor mode for suspicious content in emails. A computer-implemented method inclu...
Invention Self-optimizing deployment of decoupled threat management applications within cloud environments....
2023 Invention Active verification of security infrastructure. In order to actively monitor functioning of secu...
Invention Multistage quarantine of emails. A computer-implemented method includes receiving an email for p...
Invention Endpoint computer configuration management. A method comprises storing a policy type having a pl...
Invention Systems and methods for updating a network appliance. Systems and methods for updating a network...
Invention Malicious enumeration attack detection. A computer system implemented method includes receiving ...
Invention Guiding configuration of a switch stack. In one embodiment, techniques are provided to guide a us...
Invention Classification using neighborhood resident analysis. A computer system implemented method for det...
Invention Cloud-based resource discovery system and method. Systems and methods for configuring a network s...
Invention Systems and methods for processing electronic communications. Systems and methods for processing...
G/S Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls
Invention Techniques for monitoring usage of a dynamically bound method of a software object. In example e...
Invention Detecting malware activity using kernel-based process discovery detection. Malware attacks seek ...
Invention Monitoring process data acquisition and exfiltration. A computer-implemented method includes iden...
G/S (Based on Use in Commerce) (Based on 44(d) Priority Application) (Based on 44(e)) Authentication ...
G/S Providing online non-downloadable digital goods, namely computer software, computer hardware, ele...
G/S 3D spectacles; Downloadable augmented reality software for virtual reality; Downloadable cloud-co...
G/S Computer software; metaverse software; utility, security and cryptography software; computer soft...
2022 G/S (Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones...
G/S (Based on 44(d) Priority Application) Downloadable computer software for controlling and managing...
G/S Downloadable computer software, downloadable computer programs, and downloadable mobile applicati...
G/S Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB computer security ke...
G/S Communication by computer terminals; Information transmission via electronic communications netwo...
G/S Computer hardware; wireless access points; computer software, computer programs, and downloadabl...
G/S Computer hardware; wireless access points devices namely, wireless routers; computer software, co...
G/S Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s...
G/S Computer hardware; wireless access points; computer software, computer programs, and downloadable...
G/S Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a...
G/S Computer hardware, namely, for data networking; Downloadable computer software for managing, conf...
G/S Computer programming services for the protection of software; data security services; computer so...
G/S Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat...
G/S Computer hardware; computer software; wireless access points; computer software, computer program...
G/S Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware...
G/S (Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documen...
G/S Downloadable security software to provide cybersecurity protection; computer hardware; wireless a...
2021 G/S (Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf...
G/S (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ...
G/S Computer security consultancy; Computer virus protection services; Cloud computing featuring soft...
G/S Computer diagnostic services; Computer security consultancy; Computer security consultancy in the...