2024
|
Invention
|
Systems and methods for identifying security requirements in a ztna system.
Various embodiments ... |
|
Invention
|
Machine learning systems and methods for api discovery and protection by url clustering with sche... |
|
Invention
|
Automatic configuration of sd-wan link rules on a per application basis using real-time network c... |
|
Invention
|
Integrating 5g network security services with other types of wireless local access network (wlan)... |
|
Invention
|
Cache look up during packet processing by uniformly caching non-uniform lengths of payload data i... |
|
Invention
|
Adaptive multicast data rate configuration in managed wi-fi networks to improve throughput using ... |
|
Invention
|
Systems and methods for automated incident management.
Systems, devices, and methods are discuss... |
|
Invention
|
Systems and methods for sd-wan setup automation.
Various embodiments provide systems and methods... |
|
Invention
|
Resolving the disparate impact of security exploits to resources within a resource group.
System... |
|
Invention
|
Systems and methods for secure, scalable zero trust security processing.
Various approaches for ... |
|
Invention
|
Systems and methods for automated risk-based network security focus.
Systems, devices, and metho... |
|
Invention
|
Systems and methods for security policy organization using a dual bitmap.
Systems, devices, and ... |
|
Invention
|
Detecting zero-day malware with tetra code.
A string sample is received from a file in real-time... |
|
Invention
|
Non-interfering access layer end-to-end encryption for iot devices over a data communication netw... |
|
Invention
|
Identifying attacks to active resources by trusted devices with fake vulnerabilities on deceptive... |
|
Invention
|
Systems and methods for rapid natural language based message categorization.
Systems, devices, a... |
|
Invention
|
Automatic detection of malware families and variants without the presence of malware files based ... |
|
Invention
|
Global visibility for virtual private network (vpn) conditions for routing optimizations.
A loca... |
2023
|
Invention
|
Software defined network access for endpoint. Multiple types of lines are made simultaneously ava... |
|
Invention
|
Leveraging generative artificial intelligence (‘ai’) for securing a monitored deployment. Leverag... |
|
Invention
|
Identifying encountered and unencountered conditions in software applications. Identifying encoun... |
|
Invention
|
Enhancing security of a cloud deployment based on learnings from other cloud deployments. Learnin... |
|
Invention
|
Evaluation of web requests with an external source of information by browser extensions using an ... |
|
Invention
|
Systems and methods for non-equal boundary security policy application in a network appliance.
V... |
|
Invention
|
Systems and methods for multi-tenant segmentation to virtualize ztna processing.
Systems, device... |
|
Invention
|
Systems and methods for detection of denial of service attacks for protocols with high burst data... |
|
Invention
|
Systems and methods for detecting complex attacks in a computer network.
Various embodiments pro... |
|
Invention
|
Systems and methods for automated incident management. Systems, devices, and methods are discusse... |
|
Invention
|
Systems and methods for edge processing using selectively suspended network security.
Various em... |
|
Invention
|
Systems and methods for network edge selection of network security processing.
Various embodimen... |
|
Invention
|
Systems and methods for multi-level segmented ztna access control.
Various embodiments provide s... |
|
Invention
|
Systems and methods for multi-level segmented ztna access control using resynchronization.
Vario... |
|
Invention
|
Risk evaluation for a vulnerability assessment system on a data communication network from a coll... |
|
Invention
|
Detecting anomalies in a network environment. Activities within a network environment are monitor... |
|
Invention
|
Tetra systems and methods for clustering files based upon structure.
Various embodiments provide... |
|
Invention
|
Laying out security zone policies for information technology and operational technology devices o... |
|
Invention
|
Systems and methods for network endpoint device security fabric.
Various embodiments provide sys... |
|
Invention
|
Systems and methods for visualizing detected attacks in a computer network.
Various embodiments ... |
|
Invention
|
Optmization of communication between network devices using wireless.
A downstream wired port rec... |
|
Invention
|
Locationing accuracy and analytics of wireless devices.
A plurality of access points synch with ... |
|
Invention
|
Synchronously evaluating web requests in a web browser using asynchronous information services.
... |
|
Invention
|
Machine learning language based dynamic network discovery.
An adaptive TTL model is generated fr... |
|
Invention
|
Systems and methods for applying unfair throttling to security service requests.
Various embodim... |
|
Invention
|
Fast gap reduction in policy tree creation for policy set with uneven density.
A policy tree of ... |
|
Invention
|
Preemptive network remediation of wireless network issues with artificial intelligence to prevent... |
|
Invention
|
Generating computer code for remediating detected events. Integrating a natural language interfac... |
2022
|
Invention
|
Instruction-level threat assessment. Instruction-level threat assessment, including: identifying ... |
|
G/S
|
Software as a service (SAAS) services, featuring software for use in providing cybersecurity moni... |
|
Invention
|
Universal cloud data ingestion for stream processing. An example method includes accessing, by a ... |
|
Invention
|
Deduplication of monitored communications data in a cloud environment. Example systems and method... |
|
G/S
|
Data processing equipment; computer hardware; network hardware; network gateway hardware; softwar... |
2021
|
G/S
|
Computer hardware; data processors; data processing equipment, namely, content processors; networ... |
|
G/S
|
Operating system programs; computer operating programs and computer operating systems; computer s... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Computer hardw... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; LAN (local are... |
2018
|
G/S
|
Computer network gateway hardware and software for enabling
computer gateway services, namely, f... |
|
G/S
|
Computer consulting services; computer software and network
security research and development se... |
|
G/S
|
Operating system programs; Computer operating programs and computer operating systems; computer s... |
2017
|
G/S
|
Information technology consulting services; Computer software consulting; Computer consultation i... |
2015
|
G/S
|
Computer hardware; computer switches; Ethernet switches; Automatic transfer switches (ATS); compu... |
2014
|
G/S
|
computer services, namely, cloud hosting provider services; consulting services in the field of c... |
|
G/S
|
Providing return merchandise authorization services, namely, management of returned merchandise a... |
|
G/S
|
Electronic software updates, namely, downloadable computer software and associated data files for... |
|
G/S
|
Computer hardware; wide area and local area computer network hardware, firmware and software, for... |
|
G/S
|
Monitoring of computer systems for security purposes; consulting services in the field of maintai... |
2010
|
G/S
|
Computer network operating system featuring network
security, network management, processing of ... |
|
G/S
|
Computer consulting services, namely, computer software,
hardware, firmware, and network consult... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software, for managin... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for monitori... |
|
G/S
|
Electronic software updates, namely, downloadable computer
software and associated data files fo... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for promotin... |
2008
|
G/S
|
Computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for monitorin... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for promoting... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software, for managing... |
|
G/S
|
Computer software for protecting computer systems and mobile devices to promote network efficienc... |
2007
|
G/S
|
Computer hardware; network hardware; network gateway hardware; computer software; downloadable co... |
|
G/S
|
Computer hardware; network hardware; computer software; downloadable computer software; firmware;... |
2004
|
G/S
|
Hosting the websites on a computer server for a global computer network |
|
G/S
|
Computer hardware namely Computer Network Gateway. Network Security Consulting. |
|
G/S
|
Computer hardware namely Computer Network gateway. Network Security Consulting. |
2001
|
G/S
|
computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
computer network gateway hardware and software for enabling computer gateway services, namely, fo... |