2025
|
Invention
|
Cloud-based zero trust network access service.
A cloud-based platform for zero trust network acc... |
|
Invention
|
Validation of ztna configuration for a multi-tenant proxy environment.
A cloud-based platform fo... |
|
G/S
|
Anti-malware software; anti-virus software; anti-ransomware software; intrusion detection systems... |
|
G/S
|
Downloadable computer anti-virus software; Downloadable computer software for anti-malware, anti-... |
|
Invention
|
Deduplication of endpoint connections. In an enterprise network with a threat management facility... |
|
Invention
|
Augmented security recognition tasks.
A system for conducting a security recognition task, the s... |
|
Invention
|
Methods and apparatus for natural language interface for constructing complex database queries.
... |
|
Invention
|
Compound threat detections in cloud computing environments.
A graph of nodes is created represen... |
|
Invention
|
Rapid exposure detections in cloud computing environments.
A log of resource modifications in a ... |
|
Invention
|
Tracking threat actors across cloud identities.
A variety of techniques are used to locate and c... |
|
Invention
|
Detecting persistent attacks in cloud computing environments.
An evidence table for threat data ... |
|
G/S
|
Downloadable computer anti-virus software; Computer hardware; Computer networking hardware; Downl... |
|
G/S
|
Computer software; Artificial intelligence software; machine learning software; threat detection ... |
|
Invention
|
Apparatus and methods for an application programming interface to detect and locate malware in me... |
|
Invention
|
Firewall techniques for colored objects on endpoints.
An application executing on an endpoint ac... |
|
Invention
|
Malware mitigation based on runtime memory allocation.
A compute instance is instrumented to det... |
2024
|
Invention
|
Realtime event detection.
An event handler implements a state machine or similar construct for p... |
|
Invention
|
Misconfigured mirror port detection.
A method includes monitoring a plurality of packets receive... |
|
G/S
|
Computer software; computer anti-adware software; computer anti-malware software; computer anti-s... |
|
G/S
|
Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg war... |
|
Invention
|
Domain name service protection for secure web gateway.
A secure web gateway for a cloud computin... |
|
Invention
|
Cold start user activity anomaly detection in cloud computing environment.
A system and method f... |
|
Invention
|
Firewall offloading.
A firewall system provides two network paths for network flows: one path th... |
|
Invention
|
Methods and apparatus for visualization of machine learning malware detection models.
Embodiment... |
|
Invention
|
Use of an application controller to monitor and control software file and application environment... |
|
Invention
|
Aggregating security events.
A stream of events is received at a local security agent running on... |
|
Invention
|
Determining events that prevent processing of email messages.
A computer-implemented method incl... |
|
Invention
|
Zero trust network access connector for customer premises.
A zero trust network access (ZTNA) sy... |
|
Invention
|
Websocket server for cloud-based zero trust network access data plane.
In order to efficiently m... |
|
Invention
|
Load balancing for cloud-based zero trust network access data plane.
In a cloud-based data plane... |
|
Invention
|
Incremental enrichment of threat data.
A threat management facility receives data from a variety... |
|
Invention
|
Streaming and filtering event objects into a data lake.
An asynchronous stream of security event... |
|
Invention
|
Endpoint with remotely programmable data recorder.
An endpoint coupled in a communicating relati... |
|
Invention
|
Secure firewall configurations.
A kernel driver on an endpoint uses a process cache to provide a... |
|
Invention
|
Security integration for cloud services.
A threat management facility for an enterprise network ... |
|
Invention
|
Rules processing system.
A rule processing system uses rule objects that self-define contexts wh... |
|
Invention
|
Data augmentation for threat investigation in an enterprise network.
An endpoint in an enterpris... |
|
Invention
|
Deduplication of endpoint connections.
In an enterprise network with a threat management facilit... |
|
Invention
|
Managing untyped network traffic flows.
An enterprise security system is improved by managing ne... |
|
Invention
|
Systems and methods for processing network communications.
Systems and methods for processing an... |
|
Invention
|
Dynamic signature selection systems and methods.
Systems and methods for detecting threats using... |
|
Invention
|
Configuring a monitor mode for suspicious content in emails.
A computer-implemented method inclu... |
|
Invention
|
Self-optimizing deployment of decoupled threat management applications within cloud environments.... |
2023
|
Invention
|
Active verification of security infrastructure.
In order to actively monitor functioning of secu... |
|
Invention
|
Multistage quarantine of emails.
A computer-implemented method includes receiving an email for p... |
|
Invention
|
Endpoint computer configuration management.
A method comprises storing a policy type having a pl... |
|
Invention
|
Systems and methods for updating a network appliance.
Systems and methods for updating a network... |
|
Invention
|
Malicious enumeration attack detection.
A computer system implemented method includes receiving ... |
|
Invention
|
Guiding configuration of a switch stack. In one embodiment, techniques are provided to guide a us... |
|
Invention
|
Classification using neighborhood resident analysis. A computer system implemented method for det... |
|
Invention
|
Cloud-based resource discovery system and method. Systems and methods for configuring a network s... |
|
Invention
|
Systems and methods for processing electronic communications.
Systems and methods for processing... |
|
G/S
|
Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls |
|
Invention
|
Techniques for monitoring usage of a dynamically bound method of a software object.
In example e... |
|
Invention
|
Detecting malware activity using kernel-based process discovery detection.
Malware attacks seek ... |
|
Invention
|
Monitoring process data acquisition and exfiltration. A computer-implemented method includes iden... |
|
G/S
|
(Based on Use in Commerce) (Based on 44(d) Priority Application) (Based on 44(e)) Authentication ... |
|
G/S
|
Providing online non-downloadable digital goods, namely computer software, computer hardware, ele... |
|
G/S
|
3D spectacles; Downloadable augmented reality software for virtual reality; Downloadable cloud-co... |
|
G/S
|
Computer software; metaverse software; utility, security and cryptography software; computer soft... |
2022
|
G/S
|
(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones... |
|
G/S
|
(Based on 44(d) Priority Application) Downloadable computer software for controlling and managing... |
|
G/S
|
Downloadable computer software, downloadable computer programs, and downloadable mobile applicati... |
|
G/S
|
Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB computer security ke... |
|
G/S
|
Communication by computer terminals; Information transmission via electronic communications netwo... |
|
G/S
|
Computer hardware; wireless access points; computer
software, computer programs, and downloadabl... |
|
G/S
|
Computer hardware; wireless access points devices namely, wireless routers; computer software, co... |
|
G/S
|
Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s... |
|
G/S
|
Computer hardware; wireless access points; computer software, computer programs, and downloadable... |
|
G/S
|
Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a... |
|
G/S
|
Computer hardware, namely, for data networking; Downloadable computer software for managing, conf... |
|
G/S
|
Computer programming services for the protection of software; data security services; computer so... |
|
G/S
|
Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat... |
|
G/S
|
Computer hardware; computer software; wireless access points; computer software, computer program... |
|
G/S
|
Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware... |
|
G/S
|
(Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documen... |
|
G/S
|
Downloadable security software to provide cybersecurity protection; computer hardware; wireless a... |
2021
|
G/S
|
(Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf... |
|
G/S
|
(Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ... |
|
G/S
|
Computer security consultancy; Computer virus protection services; Cloud computing featuring soft... |
|
G/S
|
Computer diagnostic services; Computer security consultancy; Computer security consultancy in the... |