|
2024
|
Invention
|
Dynamic ai tester with feedback-driven learning. A device, method, and system are provided for im... |
|
|
Invention
|
Security policy refactoring using ai. A computer device (referred to as a processing engine), sys... |
|
|
Invention
|
Anomaly detection in monitored computer systems.
A computer device and method are provided for d... |
|
|
Invention
|
System and method for protecting against wipers by delaying suspicious actions. A device and meth... |
|
2023
|
Invention
|
Autonomous network policy generator. A device, system, and method are provided for generating a n... |
|
|
Invention
|
Deep learning based brand recognition.
A computer system and method are provided for generating ... |
|
|
Invention
|
Ai-driven platform for api dialogue.
A system and method are provided for utilizing a service's ... |
|
|
Invention
|
Network user permission prediction. A device and method for employing a machine learning model us... |
|
|
G/S
|
Computer hardware in the field of internet and network security; computer hardware with embedded ... |
|
|
Invention
|
Network device classification. A device and method for classifying network devices based on their... |
|
|
G/S
|
Software and / or applications incorporated into computers and / or network systems used in data ... |
|
|
Invention
|
Method for generating, sharing and enforcing network profiles for iot devices. A method and syste... |
|
2022
|
Invention
|
Dns tunneling detection and prevention. Methods and devices are provided for differentiating betw... |
|
|
Invention
|
Malicious vba detection using graph representation. A method and system are provided for detectin... |
|
|
Invention
|
Unification of data flows over network links with different internet protocol (ip) addresses. Pro... |
|
|
Invention
|
Scalable and on-demand multi-tenant and multi region secure network. Provided herein are systems ... |
|
|
Invention
|
Phishing detection using html. A device, system, and method are provided for detecting an email p... |
|
|
Invention
|
Techniques for securing services using inter-service visibility. A system and method for securing... |
|
|
Invention
|
Network traffic routing in an sd-wan. A method and network gateway are provided for routing netwo... |
|
|
Invention
|
Metadata based efficient packet processing.
A method and device are presented for decreasing pro... |
|
|
Invention
|
System and method for protecting against data storage attacks. A system, method, and device are p... |
|
|
Invention
|
Automatically mitigating potential service attacks based on learned usage impact patterns. Disclo... |
|
|
G/S
|
Computer hardware and computer software in the field of internet and network security; computer s... |
|
|
G/S
|
Computer hardware for use in the field of internet and network security; Downloadable or recorded... |
|
|
G/S
|
Computer hardware and computer software in the field of
internet and network security; computer ... |
|
2021
|
Invention
|
Methods and system for packet control and inspection in containers and meshed environments. An in... |
|
|
Invention
|
Automatically generating security rules for a networked environment based on anomaly detection. A... |
|
|
Invention
|
On-device protected dns. Methods and systems are provided for protecting DNS traffic locally on a... |
|
|
Invention
|
System and method to detect and prevent phishing attacks.
Detecting and preventing phishing atta... |
|
|
Invention
|
Systems and methods for the efficient detection of improperly redacted electronic documents. A me... |
|
|
Invention
|
Method and system to determine device vulnerabilities by scanner analysis.
Methods and systems p... |
|
2020
|
Invention
|
Method for detection of malicious applications.
Systems and computerized and computer-implemente... |
|
|
Invention
|
System and method for performing automated security reviews. An automated method executed by circ... |
|
|
Invention
|
Implementing a multi-regional cloud based network using network address translation. Provided her... |
|
|
Invention
|
Methods and systems for identifying malware enabled by automatically generated domain names. Comp... |
|
|
Invention
|
Method and system for detecting malicious or suspicious activity by baselining host behavior.
Th... |
|
2019
|
Invention
|
Method and system for detecting kernel corruption exploits. Methods and systems provide for detec... |
|
|
Invention
|
Method and system for modeling all operations and executions of an attack and malicious process e... |
|
|
Invention
|
Method and system for detecting and classifying malware based on families. Methods and systems ut... |
|
|
Invention
|
Anti-malware detection and removal systems and methods. An anti-malware system including at least... |
|
|
Invention
|
Method and system for reducing false positives in web application firewalls. Computerized methods... |
|
2018
|
Invention
|
Method for performing tls/ssl inspection based on verified subject name. Methods and systems for ... |
|
|
Invention
|
Method and system for cooperative inspection of encrypted sessions.
The present invention is a c... |
|
|
Invention
|
Cloud security assessment system using near-natural language compliance rules. A cloud security a... |
|
|
Invention
|
Method and system for detecting and remediating polymorphic attacks across an enterprise. Disclos... |
|
|
Invention
|
On-device network protection. Methods performed by a system on a computer device, such as a smart... |
|
|
Invention
|
Digital mdr (managed detection and response) analysis. A method for detecting an occurrence of an... |
|
2017
|
Invention
|
Method to identify users behind a shared vpn tunnel. Transparently identifying users using a shar... |
|
|
Invention
|
Method to avoid inspection bypass due to dns poisoning or http host header spoofing.
Cyber secur... |
|
|
Invention
|
Online assets continuous monitoring and protection. The present invention relates to a method and... |
|
2014
|
G/S
|
Printed matter, courseware, instructional and teaching materials, catalogs, brochures, tutorials,... |
|
2013
|
G/S
|
providing information updates on security threats to computer networks; providing online, non-dow... |
|
2003
|
G/S
|
Computer software for detecting security attacks and protecting computer networks from security a... |
|
|
G/S
|
Computer software for implementing and managing network security. |
|
|
G/S
|
Computer software for use in storing and distributing information for use in managing network sec... |
|
|
G/S
|
Computer software for implementing and managing network security. |
|
2002
|
G/S
|
computer software for monitoring and analyzing computer network performance |
|
|
G/S
|
Computer software to protect systems from unauthorized access and to protect the security of comp... |
|
2000
|
G/S
|
Software and/or applications incorporated into computers and/or network systems used in data netw... |
|
|
G/S
|
Computer software for internet service providers and telecommunications companies for managing ne... |
|
|
G/S
|
Computer software to protect the security of computer networks. |
|
|
G/S
|
Computer software intended to protect computer systems from unauthorized access via computer netw... |
|
1996
|
G/S
|
software and/or applications incorporated into computers and/or network systems used in data netw... |
|
1994
|
G/S
|
computer software intended to protect computer systems from unauthorized access via computer netw... |