2025
|
G/S
|
Downloadable and recorded computer software for computer, network, and device security, for ident... |
|
Invention
|
Device classification using machine learning models.
A system is configured to obtain data assoc... |
2024
|
Invention
|
Framework for investigating events.
A method includes accessing events associated with a network... |
|
Invention
|
Decision optimization mechanism for device classification.
Systems, methods, and related technol... |
|
Invention
|
Behavior based profiling.
Systems, methods, and related technologies for profiling an entity and... |
|
Invention
|
Iterative development of protocol parsers.
Systems and methods to determine fields of an unknown... |
|
Invention
|
Artificial intelligence (ai) driven classifier using defined taxonomy framework. Systems and meth... |
|
Invention
|
Artificial intelligence (ai) driven classifier using defined taxonomy framework.
Systems and met... |
|
Invention
|
Anomaly detection including property changes.
Systems, methods, and related technologies for det... |
|
Invention
|
Rogue device detection including mac address spoofing detection.
Systems, methods, and related t... |
|
Invention
|
Enhanced device classification including crowdsourced classifications for increased accuracy. Sys... |
|
Invention
|
Proactive inspection technique for improved classification. Systems, methods, and related technol... |
|
Invention
|
Device identification and policy enforcement using power over ethernet (poe).
Systems, methods, ... |
|
Invention
|
Fingerprinting assisted by similarity-based semantic clustering. Systems, methods, and related te... |
|
Invention
|
Segmentation management including visualization, configuration, simulation, or a combination ther... |
|
Invention
|
Attribute-based policies for integrity monitoring and network intrusion detection.
A method of d... |
|
Invention
|
Name translation monitoring. Systems, methods, and related technologies for analyzing traffic are... |
|
Invention
|
Self-training classification. Systems, methods, and related technologies for classification are d... |
|
Invention
|
Clustering enhanced analysis.
Systems, methods, and related technologies for clustering are desc... |
|
Invention
|
Determining cryptographic quantum-safety for network assets.
A system includes a processing devi... |
|
Invention
|
Device visibility and scanning including network segments.
Device scanning aspects are described... |
2023
|
Invention
|
Behavior based profiling. Systems, methods, and related technologies for profiling an entity and ... |
|
Invention
|
Visibility and scanning of a variety of entities.
Systems, methods, and related technologies for... |
|
Invention
|
Entity attribute designation based on logic programming.
Systems, methods, and related technolog... |
|
Invention
|
Sub-networks based security method, apparatus and product. A method, apparatus and product for su... |
|
Invention
|
Device classification. Systems, methods, and related technologies for device classification are d... |
|
Invention
|
Determining cryptographic quantum-safety for network assets. A system includes a processing devic... |
|
Invention
|
Configurable network traffic parser. Systems, methods, and related technologies for parsing netwo... |
|
Invention
|
Generating network system maps based on network traffic.
Systems, methods, and related technolog... |
|
Invention
|
Framework for investigating events. A method includes accessing events associated with a network ... |
|
Invention
|
Iterative development of protocol parsers. Systems, methods, and related technologies for determi... |
|
Invention
|
Multiple granularity classification. Systems, methods, and related technologies for classificatio... |
|
Invention
|
Device classification using machine learning models. Systems, methods, and related technologies f... |
|
Invention
|
Increasing data availability.
Systems, methods, and related technologies for increasing data ava... |
|
Invention
|
Dynamic segmentation management. Systems, methods, and related technologies for segmentation mana... |
|
Invention
|
Agentless network traffic mapping.
Systems, methods, and related technologies for generating a n... |
|
Invention
|
Attribute-based policies for integrity monitoring and network intrusion detection. A method of de... |
|
Invention
|
Automatic threat actor attribution based on multiple evidence. Systems, methods, and related tech... |
2022
|
Invention
|
Text classification based device profiling.
Systems and methods for generating an entity classif... |
|
Invention
|
Network access control from anywhere.
Systems, methods, and related technologies for managing ne... |
|
Invention
|
Decision optimization mechanism for device classification. Systems, methods, and related technolo... |
|
Invention
|
Centralized network response to mitigate a data-based security risk. Systems, methods, and relate... |
|
Invention
|
Automatic generation of attack patterns for threat detection.
Systems and methods for automatic ... |
|
Invention
|
Assessing entity risk based on exposed services.
Systems and methods for determining a risk asso... |
|
Invention
|
Matching common vulnerabilities and exposures. Systems and methods for identifying common vulnera... |
|
Invention
|
Risk driven planning and simulation for a computer network. Systems, methods, and related technol... |
2017
|
G/S
|
Computer software for enabling the efficient exchange of information; Computer software for provi... |
|
G/S
|
Computer hardware; Computer software to enable security and IT management systems to exchange inf... |
2016
|
G/S
|
Computer hardware; Computer software for enabling security and IT management systems to exchange ... |
|
G/S
|
Apparatus, instruments and cables for electricity; Devices for treatment using electricity; Measu... |
2005
|
G/S
|
Computer software for administration of computer local area networks |
2002
|
G/S
|
computer software designed to provide computer network perimeter security; computer hardware |