|
2025
|
G/S
|
Application service provider (ASP) featuring software for use in cybersecurity; Cloud computing f... |
|
|
Invention
|
Lookalike domain phishing detection.
The present disclosure enhances domain lookalike detection ... |
|
|
Invention
|
Public to private mobile access.
This invention provides methods and systems for seamless mobile... |
|
|
Invention
|
Zero trust policy engine for controlling access to network applications.
Disclosed is a method f... |
|
|
Invention
|
Inline nested data loss protection (dlp).
The disclosure presents systems and methods for hierar... |
|
|
Invention
|
Detecting phishing websites using perceptual image hashing.
Systems and methods for detecting ph... |
|
|
Invention
|
Cellular network performance monitoring and optimization.
The present invention provides systems... |
|
|
Invention
|
Multi-tenant cloud to cloud incident routing.
Systems and methods for securely transferring Data... |
|
|
Invention
|
Providing access continuity via tenant-specific private clouds.
Systems and methods for providin... |
|
|
Invention
|
Integrating deception-based attack intelligence with external attack surface management (easm) da... |
|
|
Invention
|
Dynamic invocation of synthetic probes based on real user monitoring agents.
Systems and methods... |
|
|
Invention
|
Cloud activity anomaly detection.
Anomaly detection in cloud-based systems involves predicting i... |
|
|
Invention
|
Multi modal application segmentation data capture.
Systems and methods include obtaining applica... |
|
|
Invention
|
Cybersecurity risk analysis via reverse external attack surface discovery.
Systems and methods a... |
|
|
Invention
|
Cloud-based man-in-the-middle inspection of encrypted traffic.
A method for inspecting encrypted... |
|
|
Invention
|
Statistical network application security policy generation.
A method for automatically generatin... |
|
|
Invention
|
Determining uniform resource locator (url) similarity via convolutional neural networks (cnn).
S... |
|
|
Invention
|
Cloud-based browser isolation with graphics processing unit (gpu) forking.
Systems and methods f... |
|
2024
|
Invention
|
Active directory security enforcement and threat insights on zero trust networks.
Systems and me... |
|
|
Invention
|
Memory surge protection for application segmentation models.
Systems and methods for memory surg... |
|
|
Invention
|
Systems and methods for determining similarity between uniform resource locators (urls) based on ... |
|
|
Invention
|
Systems and methods for implementing a service identity platform with cloud-based public key infr... |
|
|
Invention
|
Systems and methods for a cloud environment configuration artificial intelligence (ai) assistant ... |
|
|
Invention
|
Data loss protection (dlp) utilizing distilled large language models (llms).
Systems and methods... |
|
|
Invention
|
Divide-and-conquer prompt for llm-based text-to-sql conversion.
Systems and methods for processi... |
|
|
Invention
|
Systems and methods for anomaly detection based on endpoint and network traffic profiles.
System... |
|
|
Invention
|
Inline multimodal data loss protection (dlp) utilizing fine-tuned image and text models.
Inline ... |
|
|
Invention
|
Systems and methods for generating location-based application segments.
Systems and methods for ... |
|
|
Invention
|
Systems and methods for providing cloud integration recommendations based on real-time traffic mo... |
|
|
Invention
|
Systems and methods for generating lookalike uniform resource locators (urls) based on penalty-ba... |
|
|
Invention
|
Systems and methods for configuration management database (cmdb) based application segmentation. ... |
|
|
Invention
|
Detecting and fixing collisions in artificial intelligence agents.
Systems and methods for detec... |
|
|
Invention
|
Next generation artificial intelligence agents.
Systems and methods for next generation artifici... |
|
|
Invention
|
Analyzing cloud-based services for compliance with multiple regulations.
Systems and methods for... |
|
|
Invention
|
Systems and methods for generating and utilizing lookalike uniform resource locators (urls).
Sys... |
|
|
Invention
|
Systems and methods for active directory protection in zero trust networks.
Systems and methods ... |
|
|
Invention
|
Systems and methods for uniquely labeling egress traffic from secure service edge (sse) platforms... |
|
|
Invention
|
Systems and methods for identifying legitimate network traffic imitation.
Systems and methods in... |
|
|
Invention
|
Systems and methods for a hypertext transfer protocol secure (https) proxy service.
Systems and ... |
|
|
Invention
|
Systems and methods for generating and utilizing synthetic data.
Systems and methods for generat... |
|
|
Invention
|
Multimodal data loss protection using artificial intelligence.
Multimodal Data Loss Protection (... |
|
|
Invention
|
Systems and methods for structural similarity based hashing.
Systems and methods for structural ... |
|
|
Invention
|
Systems and methods for enforcing policy based on assigned user risk scores in a cloud-based syst... |
|
|
Invention
|
Systems and methods for cloud-centric biometric step-up and authentication.
Systems and methods ... |
|
|
Invention
|
Systems and methods for endpoint process metadata based policy enforcement.
Systems and methods ... |
|
|
Invention
|
Systems and methods for inline hypertext transfer protocol (http) cookie encryption.
Systems and... |
|
|
Invention
|
Systems and methods for deploying independent pipelines in a cloud-based system.
Systems and met... |
|
|
G/S
|
Cloud computing featuring software for use in user management, user authentication, and entitleme... |
|
|
Invention
|
Systems and methods for centralized management of a plurality of cloud services of a cloud-based ... |
|
|
Invention
|
Hyper-customized customer defined machine learning models.
Systems and methods for hyper-customi... |
|
|
Invention
|
Systems and methods for tag-based policy enforcement for dynamic cloud workloads.
Systems and me... |
|
2023
|
G/S
|
Providing on-line non-downloadable software for scanning and detecting of viruses, worms, trojans... |
|
|
G/S
|
Providing on-line non-downloadable software using artificial intelligence for learning from chang... |
|
|
Invention
|
System and method for utilizing dhcp relay to accomplish quarantining client endpoints in a ranso... |
|
|
G/S
|
Cloud computing featuring software for use in maintaining interconnections between users and devi... |
|
|
G/S
|
Computer disaster recovery planning |
|
2022
|
G/S
|
Cloud computing featuring cloud security posture management (CSPM) software for use in securing c... |
|
2021
|
G/S
|
Cloud computing featuring software for use in monitoring internet access, providing private appli... |
|
2020
|
G/S
|
Cloud computing featuring software for monitoring computer network security, Internet access, and... |
|
|
G/S
|
Digital security and experience management services, namely, enforcing, restricting, enhancing an... |
|
2019
|
G/S
|
Providing temporary use of on-line non-downloadable cloud computing featuring software for use in... |
|
|
G/S
|
Cloud computing featuring software for use in collaboration between users in a secure manner |
|
|
G/S
|
Downloadable computer software for internet security Application service provider (ASP) featuring... |
|
|
G/S
|
IT training services |
|
2018
|
G/S
|
Cloud computing featuring software for use in policy-based, secure access to the Internet |
|
|
G/S
|
Cloud computing featuring software for use in policy-based, secure access to the private applicat... |
|
2017
|
G/S
|
Software for internet security. Application service provider (ASP) services in the field of Inter... |
|
|
G/S
|
Downloadable cloud-based software for use in policy-based, secure access to the Internet Cloud co... |
|
|
G/S
|
Computer security services, namely, cloud-based security over the internet in the nature of provi... |
|
2016
|
G/S
|
Downloadable cloud-based software for use in policy-based, secure access to private applications ... |
|
2013
|
G/S
|
Computer services, namely, providing virtual and non virtual application servers, web servers, fi... |
|
2008
|
G/S
|
Software for Internet security. Application service provider (ASP) services in the field of
Inte... |
|
|
G/S
|
Software for Internet security Application service provider (ASP) services in the field of Intern... |