2025
|
Invention
|
Multi modal application segmentation data capture.
Systems and methods include obtaining applica... |
|
Invention
|
Cybersecurity risk analysis via reverse external attack surface discovery.
Systems and methods a... |
|
Invention
|
Cloud-based man-in-the-middle inspection of encrypted traffic.
A method for inspecting encrypted... |
|
Invention
|
Statistical network application security policy generation.
A method for automatically generatin... |
|
Invention
|
Cloud-based data security posture management (dspm).
Systems and methods include discovering and... |
|
Invention
|
Cloud-based browser isolation with graphics processing unit (gpu) forking.
Systems and methods f... |
|
Invention
|
Distributed worker pool for crawling data stored in the cloud.
Systems and methods for operating... |
|
Invention
|
Software security agent updates via microcode.
Systems and methods for updating a security agent... |
|
Invention
|
Systems and methods for intelligent machine learning-based malware detection.
Systems and method... |
|
Invention
|
Cloud-based intrusion prevention system, multi-tenant firewall, and stream scanner.
A method of ... |
|
Invention
|
Utilizing small sized large language models (llms) for performing domain classification.
Systems... |
|
Invention
|
Disaster recovery for private application access continuity.
Systems and methods for private app... |
2024
|
Invention
|
Differential dynamic memory scanning.
Systems and methods for differential dynamic memory scanni... |
|
Invention
|
Active directory security enforcement and threat insights on zero trust networks.
Systems and me... |
|
Invention
|
Data loss protection (dlp) utilizing distilled large language models (llms).
Systems and methods... |
|
Invention
|
Inline multimodal data loss protection (dlp) utilizing fine-tuned image and text models.
Inline ... |
|
Invention
|
Detecting and fixing collisions in artificial intelligence agents.
Systems and methods for detec... |
|
Invention
|
Next generation artificial intelligence agents.
Systems and methods for next generation artifici... |
|
Invention
|
Systems and methods for active directory protection in zero trust networks.
Systems and methods ... |
|
Invention
|
Systems and methods for identifying legitimate network traffic imitation.
Systems and methods in... |
|
Invention
|
Systems and methods for cloud security system assistance utilizing custom large language models (... |
|
Invention
|
Systems and methods for a hypertext transfer protocol secure (https) proxy service.
Systems and ... |
|
Invention
|
Systems and methods for generating and utilizing synthetic data.
Systems and methods for generat... |
|
Invention
|
Multimodal data loss protection using artificial intelligence.
Multimodal Data Loss Protection (... |
|
Invention
|
Systems and methods for structural similarity based hashing.
Systems and methods for structural ... |
|
Invention
|
Systems and methods for enforcing policy based on assigned user risk scores in a cloud-based syst... |
|
Invention
|
Systems and methods for visualizing security coverage based on mitre att&ck framework.
Systems a... |
|
Invention
|
Systems and methods for cloud-centric biometric step-up and authentication.
Systems and methods ... |
|
Invention
|
Systems and methods for endpoint process metadata based policy enforcement.
Systems and methods ... |
|
Invention
|
Systems and methods for inline hypertext transfer protocol (http) cookie encryption.
Systems and... |
|
Invention
|
Systems and methods for deploying independent pipelines in a cloud-based system.
Systems and met... |
|
G/S
|
Cloud computing featuring software for use in user management, user authentication, and entitleme... |
|
Invention
|
Systems and methods for centralized management of a plurality of cloud services of a cloud-based ... |
|
Invention
|
Hyper-customized customer defined machine learning models.
Systems and methods for hyper-customi... |
|
Invention
|
Systems and methods for automated certificate generation and management inside zero trust private... |
|
Invention
|
Systems and methods for tag-based policy enforcement for dynamic cloud workloads.
Systems and me... |
2023
|
Invention
|
Systems and methods for detailed cloud posture remediation recommendations utilizing custom large... |
|
Invention
|
Systems and methods for utilizing large language models (llms) for improving machine learning mod... |
|
Invention
|
Systems and methods for detecting abnormal permissions in a cloud environment.
Systems and metho... |
|
Invention
|
Systems and methods for directing and enforcing zero trust control on requests to destination ser... |
|
Invention
|
Systems and methods for active exposure and unwanted connection protection.
Systems and methods ... |
|
Invention
|
Systems and methods for abnormal classless inter-domain routing (cidr) access detection.
Systems... |
|
Invention
|
Entitlement-based identity power scoring system for cloud environments.
Systems and methods for ... |
|
Invention
|
Systems and methods for intelligent application definition and protection.
Systems and methods f... |
|
Invention
|
Systems and methods for dynamic distributed name resolution.
Systems and methods for dynamic dis... |
|
Invention
|
Systems and methods for detecting and assigning identities for workloads.
Systems and methods fo... |
|
Invention
|
Systems and methods for generating sub-identities for workloads.
Systems and methods for generat... |
|
Invention
|
Security policy framework for cloud environments.
The present disclosure includes systems and me... |
|
Invention
|
Systems and methods for anomaly detection on resource activity logs. The present disclosure inclu... |
|
Invention
|
Systems and methods for detecting and remediating inconsistent tags in cloud-native networks.
Sy... |
|
Invention
|
Systems and methods for removing sensitive data from a cloud-based system.
Systems and methods f... |
|
G/S
|
Providing on-line non-downloadable software for scanning and detecting of viruses, worms, trojans... |
|
G/S
|
Providing on-line non-downloadable software using artificial intelligence for learning from chang... |
|
G/S
|
Cloud computing featuring software for use in maintaining interconnections between users and devi... |
|
G/S
|
Computer disaster recovery planning |
2022
|
G/S
|
Cloud computing featuring cloud security posture management (CSPM) software for use in securing c... |
2021
|
G/S
|
Cloud computing featuring software for use in monitoring internet access, providing private appli... |
2020
|
G/S
|
Cloud computing featuring software for monitoring computer network security, Internet access, and... |
|
G/S
|
Digital security and experience management services, namely, enforcing, restricting, enhancing an... |
2019
|
G/S
|
Providing temporary use of on-line non-downloadable cloud computing featuring software for use in... |
|
G/S
|
Cloud computing featuring software for use in collaboration between users in a secure manner |
|
G/S
|
Downloadable computer software for internet security Application service provider (ASP) featuring... |
|
G/S
|
IT training services |
2018
|
G/S
|
Cloud computing featuring software for use in policy-based, secure access to the Internet |
|
G/S
|
Cloud computing featuring software for use in policy-based, secure access to the private applicat... |
2017
|
G/S
|
Software for internet security. Application service provider (ASP) services in the field of Inter... |
|
G/S
|
Downloadable cloud-based software for use in policy-based, secure access to the Internet Cloud co... |
|
G/S
|
Computer security services, namely, cloud-based security over the internet in the nature of provi... |
2016
|
G/S
|
Downloadable cloud-based software for use in policy-based, secure access to private applications ... |
2013
|
G/S
|
Computer services, namely, providing virtual and non virtual application servers, web servers, fi... |
2008
|
G/S
|
Software for Internet security. Application service provider (ASP) services in the field of
Inte... |
|
G/S
|
Software for Internet security Application service provider (ASP) services in the field of Intern... |