2024
|
G/S
|
Provision of security services for computer networks, computer access, and computerized transacti... |
|
Invention
|
Unified network service that connects multiple disparate private networks and end user client dev... |
|
Invention
|
State management and storage with policy enforcement in a distributed cloud computing network.
A... |
|
G/S
|
Downloadable software libraries for creating HTTP proxy services, content delivery network (CDN) ... |
|
Invention
|
Sequential consistency across a distributed cloud computing network. Sequential consistency acros... |
|
Invention
|
Verification of selected inbound electronic mail messages.
An email verification system is descr... |
|
Invention
|
Dynamically modifying http connections.
A condition exists that triggers an HTTP server to modif... |
|
Invention
|
Securing an application or service over a network interconnect using a dedicated egress ip addres... |
|
Invention
|
It infrastructure resource discovery and management for distributed networking.
A method involve... |
|
Invention
|
Establishing and using a tunnel from an origin server in a distributed edge compute and routing s... |
|
Invention
|
Network layer performance and security provided by a distributed cloud computing network.
A GRE ... |
|
Invention
|
Distributed key management system with a key lookup service.
A first intermediate key management... |
|
Invention
|
Selective traffic processing in a distributed cloud computing network.
A server receives interne... |
|
Invention
|
Phishing email campaign identification.
A computer-implemented method, executed by one or more e... |
|
Invention
|
Identity proxy and access gateway.
A server transmits to a third-party application a request for... |
|
Invention
|
Virtual private network (vpn) whose traffic is intelligently routed.
A request is received from ... |
|
Invention
|
Theft prevention for sensitive information.
Methods, systems, and techniques for application iso... |
|
G/S
|
Computer software and firmware for monitoring and controlling online traffic to computer servers;... |
|
G/S
|
Computer software and firmware for monitoring and
controlling online traffic to computer servers... |
|
Invention
|
Enforcing security policies in a zero trust security framework using a behavioral score.
A manag... |
|
Invention
|
Isolating internet-of-things (iot) devices using a secure overlay network.
A server of a distrib... |
2023
|
G/S
|
Providing virtual private network (VPN) services, namely, private and secure electronic communica... |
|
Invention
|
State management and persistent data storage in a distributed cloud computing network. A first co... |
|
Invention
|
Business email compromise detection system.
An email is received that is from an email sender. F... |
|
Invention
|
Dynamic selection of where to execute application code in a distributed cloud computing network. ... |
|
Invention
|
Selection of an egress ip address for egress traffic of a distributed cloud computing network.
A... |
|
Invention
|
Cloud computing platform that executes code in a distributed cloud computing network.
A compute ... |
|
Invention
|
Multi-party split-key authentication.
Systems and methods are disclosed for performing multi-par... |
|
Invention
|
Cloud-based security service that includes external evaluation for accessing a third-party applic... |
|
Invention
|
Secure private traffic exchange in a unified network service.
Traffic is received at an interfac... |
|
Invention
|
Traffic load balancing between a plurality of points of presence of a cloud computing infrastruct... |
|
Invention
|
Authoritative domain name system (dns) server responding to dns requests with ip addresses select... |
|
Invention
|
State management and object storage in a distributed cloud computing network.
A first compute se... |
|
Invention
|
Cache purging in a distributed networked system. Purging resources from a cache in a distributed ... |
|
Invention
|
Machine learning based web application firewall.
A machine learning (ML) based web application f... |
|
G/S
|
Providing online non-downloadable computer software platforms for database optimization and accel... |
|
G/S
|
Platform as a service (PAAS) featuring computer software platforms for use in enabling third-part... |
|
Invention
|
Identity-based policy enforcement for sim devices.
Traffic is received at a distributed cloud co... |
|
Invention
|
Isolating suspicious links in email messages. Isolating suspicious email links is described. An e... |
|
Invention
|
Inter-process serving of machine learning features from mapped memory for machine learning models... |
|
Invention
|
Web browser remoting across a network using draw commands.
A server receives from a client devic... |
|
Invention
|
Application remoting across a network using draw commands.
A server receives from a client devic... |
|
Invention
|
Remoting application across a network using draw commands with an isolator application. A client ... |
|
Invention
|
Method and system for determining a path maximum transmission unit (mtu) between endpoints of a g... |
|
Invention
|
Methods and apparatuses for providing internet-based proxy services.
A proxy server receives, fr... |
|
Invention
|
Establishing a cryptographic tunnel between a first tunnel endpoint and a second tunnel endpoint ... |
|
Invention
|
Logging access types based on inserting tenant control headers into requests. A proxy server rece... |
|
Invention
|
Distributed key management system with a key lookup service. A first intermediate key management ... |
|
Invention
|
Distributed key management system.
A distributed key management system (KMS) includes a central ... |
|
Invention
|
Persisting encrypted remote browser data at a local browser for use in a remote browser. A remote... |
|
Invention
|
Policy-based blocking of vulnerable software installations using a proxy.
A proxy server receive... |
|
G/S
|
Providing online non-downloadable computer software platforms for controlling and managing access... |
|
Invention
|
Enforcing security policies in a zero trust security framework using a behavioral score. A manage... |
|
Invention
|
Machine learning based web application firewall. A machine learning (ML) based web application fi... |
2022
|
Invention
|
Dynamically modifying http connections. A condition exists that triggers an HTTP server to modify... |
|
G/S
|
Computer network security consultancy |
|
Invention
|
Phishing email campaign identification. A computer-implemented method, executed by one or more em... |
2021
|
G/S
|
Providing temporary use of online non-downloadable cloud computing software for controlling how e... |
|
G/S
|
Providing Domain Name System (DNS) services, namely, providing a network of authoritative name se... |
|
G/S
|
Computer security services, namely, enforcing, restricting and controlling access privileges of u... |
|
G/S
|
Computer programming services for edge computing |
|
G/S
|
Computer network services, namely, providing network communication services in the nature of tran... |
|
G/S
|
Computer security threat analysis for protecting data |
|
G/S
|
Software as a service (SAAS) services featuring software for customizable network traffic managem... |
|
G/S
|
Authentication, issuance and validation of digital certificates; Computer security threat analysi... |
|
G/S
|
Downloadable software for blocking, allowing, routing and resolution of queries of protected data... |
2020
|
G/S
|
Providing user access to global computer networks Computer security services, namely, restricting... |
2019
|
G/S
|
Downloadable software for enabling virtual private network (VPN) operation on electronic devices;... |
|
G/S
|
Downloadable cloud-computing software for network management; downloadable computer software prog... |
|
G/S
|
Downloadable cloud-computing software for network management; Downloadable computer software prog... |
|
G/S
|
Computer services, namely, providing a service to monitor
and control online traffic to computer... |
|
G/S
|
Computer software, namely, computer software to monitor and
control online traffic to computer s... |
2017
|
G/S
|
Providing a web site that features information on computer technology and programming |
2016
|
G/S
|
software as a service (SAAS) for use in identifying and responding to computer security vulnerabi... |
|
G/S
|
providing online non-downloadable data analysis software; providing online non-downloadable compu... |
|
G/S
|
Providing online non-downloadable computer software for sensing computer security threats; provid... |
2013
|
G/S
|
Computer software, namely, computer software to monitor and control online traffic to computer se... |
2011
|
G/S
|
computer services, namely, providing a service to monitor and control online traffic to computer ... |
2010
|
G/S
|
computer software, namely, computer software to monitor and control online traffic to computer se... |
|
G/S
|
Computer services, namely, providing a service to monitor and control online traffic to computer ... |