2025
|
Invention
|
Cloud-based data security posture management (dspm).
Systems and methods include discovering and... |
|
Invention
|
Distributed worker pool for crawling data stored in the cloud.
Systems and methods for operating... |
|
Invention
|
Software security agent updates via microcode.
Systems and methods for updating a security agent... |
|
Invention
|
Systems and methods for intelligent machine learning-based malware detection.
Systems and method... |
|
Invention
|
Cloud-based intrusion prevention system, multi-tenant firewall, and stream scanner.
A method of ... |
|
Invention
|
Utilizing small sized large language models (llms) for performing domain classification.
Systems... |
|
Invention
|
Disaster recovery for private application access continuity.
Systems and methods for private app... |
2024
|
Invention
|
Differential dynamic memory scanning.
Systems and methods for differential dynamic memory scanni... |
|
Invention
|
Zero trust network branch.
Systems and methods for a zero trust (ZT) network branch, which inclu... |
|
Invention
|
Pattern similarity measures to quantify uncertainty in malware classification.
A method includes... |
|
Invention
|
Encrypted traffic inspection in a cloud-based security system.
Systems and methods for cloud-bas... |
|
Invention
|
Kill-chain reconstruction.
Kill-chain reconstruction via machine learning includes, responsive t... |
|
Invention
|
Generative ai business insight report using llms.
Systems and methods for Large Language Models ... |
|
Invention
|
Systems and methods for collecting and displaying business insights in a cloud-based system.
Sys... |
|
Invention
|
Systems and methods to protect shared privileged remote access (pra) sessions based on user risk.... |
|
G/S
|
Cloud computing featuring programming software for use in a platform supporting cloud services; A... |
|
Invention
|
Systems and methods for cloud security system assistance utilizing custom large language models (... |
|
Invention
|
Systems and methods for visualizing security coverage based on mitre att&ck framework.
Systems a... |
|
G/S
|
Cloud computing featuring software for use in user management, user authentication, and entitleme... |
|
Invention
|
Systems and methods for automated certificate generation and management inside zero trust private... |
2023
|
Invention
|
Systems and methods for detailed cloud posture remediation recommendations utilizing custom large... |
|
Invention
|
Generative ai report on security risk using llms.
Systems and methods for sing Large Language Mo... |
|
Invention
|
Systems and methods for utilizing large language models (llms) for improving machine learning mod... |
|
Invention
|
Systems and methods for detecting abnormal permissions in a cloud environment.
Systems and metho... |
|
Invention
|
Systems and methods for directing and enforcing zero trust control on requests to destination ser... |
|
Invention
|
Systems and methods for active exposure and unwanted connection protection.
Systems and methods ... |
|
Invention
|
Systems and methods for abnormal classless inter-domain routing (cidr) access detection.
Systems... |
|
Invention
|
Entitlement-based identity power scoring system for cloud environments.
Systems and methods for ... |
|
Invention
|
Systems and methods for intelligent application definition and protection.
Systems and methods f... |
|
Invention
|
Systems and methods for dynamic distributed name resolution.
Systems and methods for dynamic dis... |
|
Invention
|
Machine learning using a diffusion model for out-of-distribution detection of time series data.
... |
|
Invention
|
Systems and methods for detecting and assigning identities for workloads.
Systems and methods fo... |
|
Invention
|
Systems and methods for generating sub-identities for workloads.
Systems and methods for generat... |
|
Invention
|
Identity threat detection and response.
Systems and methods are provided for protecting identity... |
|
Invention
|
Systems and methods for automated assignment and alerting of non-compliant resources.
The presen... |
|
Invention
|
Unified identity platform for multiple cloud services.
Systems and methods for providing identit... |
|
Invention
|
Security policy framework for cloud environments.
The present disclosure includes systems and me... |
|
Invention
|
Systems and methods for anomaly detection on resource activity logs.
The present disclosure incl... |
|
Invention
|
Systems and methods for pause and resume functionality for shared privileged remote access (pra) ... |
|
Invention
|
Systems and methods for detecting and remediating inconsistent tags in cloud-native networks.
Sy... |
|
Invention
|
Systems and methods for removing sensitive data from a cloud-based system.
Systems and methods f... |
|
Invention
|
Natural language interface for querying cloud security logs.
Systems and methods for processing ... |
|
Invention
|
Identity proxy isolation (ipi) through cloud browser isolation (cbi).
Systems and methods includ... |
|
Invention
|
Infrastructure as code (iac) scanner for infrastructure component security.
Systems and methods ... |
|
Invention
|
Agentless workload vulnerability scanning.
Systems and methods for agentless workload vulnerabil... |
|
Invention
|
System and method thereof for enhanced collection of data of third-party applications.
The discl... |
|
Invention
|
Systems and methods for providing efficient remediations for cloud environment vulnerabilities.
... |
|
Invention
|
Systems and methods for policy-based distributed packet capture.
Systems and methods for policy-... |
|
Invention
|
Multi-cloud network analysis and threat intelligence correlation.
The present disclosure include... |
|
Invention
|
Cloud activity anomaly detection. Systems and methods for cloud activity anomaly detection includ... |
|
G/S
|
Providing on-line non-downloadable software for scanning and detecting of viruses, worms, trojans... |
|
G/S
|
Providing on-line non-downloadable software using artificial intelligence for learning from chang... |
|
Invention
|
Systems and methods for providing zero trust access to source applications.
Systems and methods ... |
|
Invention
|
Systems and methods for cloud sandboxing with browser isolation for immediate content access.
Sy... |
|
G/S
|
Cloud computing featuring software for use in maintaining interconnections between users and devi... |
|
G/S
|
Computer disaster recovery planning |
2022
|
G/S
|
Cloud computing featuring cloud security posture management (CSPM) software for use in securing c... |
2021
|
G/S
|
Cloud computing featuring software for use in monitoring internet access, providing private appli... |
2020
|
G/S
|
Cloud computing featuring software for monitoring computer network security, Internet access, and... |
|
G/S
|
Digital security and experience management services, namely, enforcing, restricting, enhancing an... |
2019
|
G/S
|
Providing temporary use of on-line non-downloadable cloud computing featuring software for use in... |
|
G/S
|
Cloud computing featuring software for use in collaboration between users in a secure manner |
|
G/S
|
Downloadable computer software for internet security Application service provider (ASP) featuring... |
|
G/S
|
IT training services |
2018
|
G/S
|
Cloud computing featuring software for use in policy-based, secure access to the Internet |
|
G/S
|
Cloud computing featuring software for use in policy-based, secure access to the private applicat... |
2017
|
G/S
|
Software for internet security. Application service provider (ASP) services in the field of Inter... |
|
G/S
|
Downloadable cloud-based software for use in policy-based, secure access to the Internet Cloud co... |
|
G/S
|
Computer security services, namely, cloud-based security over the internet in the nature of provi... |
2016
|
G/S
|
Downloadable cloud-based software for use in policy-based, secure access to private applications ... |
2014
|
G/S
|
Internet-based application service provider featuring software for use in intelligent routing bas... |
2013
|
G/S
|
Computer services, namely, providing virtual and non virtual application servers, web servers, fi... |
2008
|
G/S
|
Software for Internet security. Application service provider (ASP) services in the field of
Inte... |
|
G/S
|
Software for Internet security Application service provider (ASP) services in the field of Intern... |