2024
|
Invention
|
System and method for cloud-based operating system event and data access monitoring.
A cloud-bas... |
|
Invention
|
Methods for switching network packets based on packet data and devices thereof.
Methods, non-tra... |
|
G/S
|
Software as a service (SAAS) services featuring software for use in managing and configuring netw... |
|
G/S
|
Software as a service (SaaS) featuring software for use in web serving, reverse proxying, caching... |
|
G/S
|
Downloadable server software for use in web serving, reverse
proxying, caching, load balancing, ... |
|
G/S
|
Downloadable computer software and computer hardware for use
in managing network communications ... |
|
Invention
|
Methods for allocating a traffic load and devices thereof.
Methods, non-transitory computer read... |
|
G/S
|
Providing an online forum for transmission and posting of messages among computer users concernin... |
|
Invention
|
Methods for managing insertion of metadata into a data stream to assist with analysis of network ... |
|
Invention
|
System and methods for filtering in oblivious deployments and devices thereof. Methods, non-trans... |
|
Invention
|
System and methods for filtering in oblivious deployments and devices thereof.
Methods, non-tran... |
2023
|
Invention
|
Methods for improving web scanner accuracy and devices thereof.
A method, non-transitory compute... |
|
G/S
|
Downloadable computer software and computer hardware for use in managing network communications t... |
|
G/S
|
Training services in the fields of operation of computers
and networks, network system design, n... |
|
G/S
|
Computer software and computer hardware for use in managing network communications traffic over t... |
|
Invention
|
Methods for detecting icmp flood attacks. Methods, non-transitory computer readable media, networ... |
|
Invention
|
Methods for detecting icmp flood attacks.
Methods, non-transitory computer readable media, netwo... |
|
Invention
|
Methods for managing hardware security servers and devices thereof. Methods, non-transitory compu... |
|
Invention
|
Methods for optimizing selection of a hardware security server and devices thereof. Methods, non-... |
|
Invention
|
Methods for migrating private hardware security keys and devices thereof. Methods, non-transitory... |
|
G/S
|
Downloadable server software for use in web serving, reverse proxying, caching, load balancing, a... |
|
Invention
|
Methods for establishing a connection to a server with a cached certificate and devices thereof. ... |
|
G/S
|
Arranging and conducting business and technical seminars and conferences in the fields of compute... |
|
Invention
|
Apparatus and methods for radio access network optimization by extending near-rt and non-rt ric f... |
|
G/S
|
Downloadable computer software for use in managing network communications traffic over the Intern... |
|
Invention
|
Methods for controlling access to shared configuration in a role-based, multi-admin centralized o... |
|
G/S
|
software as a service (SAAS) services featuring software for use in detecting, monitoring, and pr... |
|
Invention
|
Methods for allocating a traffic load and devices thereof. Methods, non-transitory computer reada... |
|
Invention
|
Detecting malicious domain name system requests using machine learning. Technologies related to m... |
|
G/S
|
Web application security software, namely, downloadable
software for ensuring security of applic... |
|
Invention
|
Multi-destination dma for packet broadcast. Technology related to broadcast packet direct memory ... |
|
Invention
|
Systems and methods for network load balancing using machine learning. Technology related to netw... |
|
Invention
|
Managing webtop resource hostname resolution.
Technology related to resolution of hostname for w... |
|
Invention
|
Managing webtop resource hostname resolution. Technology related to resolution of hostname for we... |
|
Invention
|
Adaptive temporal resource binding based on speculative pipeline interdependency. Technology rela... |
2022
|
Invention
|
Methods for managing hardware security servers and devices thereof.
Methods, non-transitory comp... |
|
Invention
|
Methods for application deployment across multiple computing domains and devices thereof.
Techno... |
|
Invention
|
Systems and methods for network traffic trunking. Technology related to sending data items via ne... |
|
Invention
|
Systems and methods for network traffic trunking.
Technology related to sending data items via n... |
|
G/S
|
Downloadable computer software for data management, data visualization, and device control; Downl... |
|
Invention
|
Methods for mitigating ddos attack using hardware device and devices thereof.
Methods, non-trans... |
|
Invention
|
System and method for multi-source vulnerability management. A method for multi-source cloud-infr... |
|
Invention
|
System and method for cloud-based operating system event and data access monitoring. A cloud-base... |
2021
|
Invention
|
Methods for application deployment across multiple computing domains and devices thereof. Technol... |
|
G/S
|
Computer software for HTTP and reverse proxy servers and mail proxy servers, namely, for controll... |
|
G/S
|
Computer software for HTTP and reverse proxy servers and
mail proxy servers, namely, for control... |
|
G/S
|
Computer services, namely, software as a service (SaaS) featuring software for managing informati... |
2020
|
G/S
|
Software as a service (SAAS) services featuring software for creating and managing a cloud- nativ... |
|
Invention
|
Methods for improved network security for web applications and devices thereof. Methods, non-tran... |
|
G/S
|
Computer software consulting; computer security consultancy; data security consultancy; computer ... |
|
G/S
|
Development tools for use in designing and implementing
programs for access to and for use in co... |
|
G/S
|
Computer software; computer software to manage
communications traffic over the Internet and clou... |
|
G/S
|
Computer software, sold both as pre installed utilities and
as separately updated downloads, for... |
|
G/S
|
Training services in the fields of operation of computers and networks, network system design, ne... |
|
G/S
|
Downloadable computer software development tools for use in designing and implementing programs f... |
|
Invention
|
Managing network traffic with sensitive data. Technology related to managing network traffic with... |
|
Invention
|
Stateless communication using a stateful protocol. Embodiments are directed to stateless communic... |
|
Invention
|
Managing name server data. Technology related to managing name server data is disclosed. In one e... |
|
G/S
|
Downloadable computer software for managing a distributed microservice network architecture, name... |
|
Invention
|
Methods for optimizing cloud-scale distributed asynchronous systems with idempotent workloads and... |
|
G/S
|
Software application delivery services, namely on-line software for ensuring security of computer... |
|
G/S
|
Providing online communities in the nature of forums and chatrooms for the transmission and posti... |
|
G/S
|
Downloadable Server software for use in web serving, reverse proxying, caching, load balancing, a... |
|
G/S
|
software as a service for providing computer network operators with the ability to monitor and in... |
2019
|
G/S
|
Web application security software, namely, downloadable software for ensuring security of applica... |
|
G/S
|
Downloadable software in the nature of a mobile application for accessing meeting, agenda, confer... |
|
Invention
|
Methods for detecting changes to a firmware and devices thereof. Methods, non-transitory computer... |
|
G/S
|
Software as a service (saas) services featuring software for centrally managing large fleets of d... |
|
G/S
|
Arranging and conducting business seminars in the fields of
computers and networks, computer sof... |
|
G/S
|
Providing online communities in the nature of forums and
chatrooms for the transmission and post... |
|
Invention
|
Methods for switching network packets based on packet data and devices. Methods, non-transitory c... |
|
G/S
|
Computer networking hardware; downloadable computer software
for use in enhancing, optimizing, s... |
|
G/S
|
Computer networking hardware; downloadable computer software for use in enhancing, optimizing, se... |
|
G/S
|
Computer software for providing secure services, namely,
managing a distributed microservice net... |
|
Invention
|
Multi-device authentication. Technology related to multi-device authentication is disclosed. In o... |
|
Invention
|
Methods for providing adaptive authentication for federated environment and devices thereof. Meth... |
|
Invention
|
Methods for dynamically mitigating network attacks and devices thereof. Methods, non-transitory c... |
|
Invention
|
Methods for traffic dependent direct memory access optimization and devices thereof. Methods, non... |
|
Invention
|
Methods for protecting cpu during ddos attack and devices thereof. Methods, non-transitory comput... |
2017
|
Invention
|
Methods for improved network security using asymmetric traffic delivery and devices thereof. Meth... |
2016
|
Invention
|
Methods for analyzing network traffic and enforcing network policies and devices thereof. A metho... |
|
Invention
|
Methods for protecting web based resources from d/dos attacks and devices thereof. A method, non-... |
|
Invention
|
Methods for improving web scanner accuracy and devices thereof. A method, non-transitory computer... |
2015
|
Invention
|
Methods for managing l7 traffic classification and devices thereof. A method, non-transitory comp... |