Palo Alto Networks, Inc.

États‑Unis d’Amérique


Commandez votre montre hebdomadaire Palo Alto Networks, Inc.
Quantité totale PI 1 328
Quantité totale incluant filiales 1 329 (+ 1 pour les filiales)
Rang # Quantité totale PI 1 030
Note d'activité PI 3,8/5.0    1 205
Rang # Activité PI 602
Symbole boursier
ISIN US6974351057
Capitalisation 127,600M  (USD)
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

1 154 34
3 18
97 14
8
 
Dernier brevet 2025 - Cve labeling for exploits using ...
Premier brevet 1994 - Remote smart filtering communica...
Dernière marque 2025 - IDIRA
Première marque 2007 - PAN-OS

Filiales

1 subsidiaries with IP (1 patents, 0 trademarks)

 S'inscrire grtuitement pour accéder à la liste des filiales

Industrie (Classification de Nice)

Derniers inventions, produits et services

2025 P/S Computer hardware; Downloadable security software for sharing and storing sensitive information o...
P/S Downloadable computer software for an enterprise browser for secure web browsing, internet access...
P/S Downloadable computer software for computer network security protection; Downloadable computer so...
P/S platform as a service (PAAS) featuring computer software platforms for managing unified data in t...
P/S Platform as a service (PAAS) featuring computer software platforms for managing unified data in t...
P/S Downloadable computer software for computer network security; Downloadable computer software for ...
Invention Malware detection for documents using knowledge distillation assisted learning. The detection of...
P/S Providing temporary use of online non-downloadable cloud native software application protection p...
P/S Providing temporary use of online non-downloadable cloud native software application protection ...
Invention Sd-wan iot security posture management. Increasing use of web-based applications or Software-as-...
Invention High availability of cloud-based services with address translation. Described herein are systems...
Invention Multiple data center compatible deployment of applications matching a wildcard domain name. A ne...
P/S Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth...
Invention Network attack detection with targeted feature extraction from exploit tools. The present applic...
Invention Selective intelligent enforcement in mobile networks. In some embodiments, a system/process/comp...
Invention Combined structure and import behavior signatures based malware learning and detection. A system...
Invention Strategically aged domain detection. Detection of strategically aged domains is detected. A set ...
Invention Detecting phishing pdfs with an image-based deep learning approach. The detection of phishing Po...
Invention Dynamically scalable application firewall deployment for cloud native applications. A configurat...
P/S Downloadable computer software for use as a security platform with security operations capabiliti...
P/S Downloadable computer software for computer network security; downloadable computer software for ...
Invention Secure access service edge for mobile networks. Techniques for providing security for providing S...
Invention Service access service edge solution for providing enhanced security for unmanaged devices for mo...
Invention Service access service edge solution for providing enhanced security for mobile networks. Techniq...
Invention Explicit proxy solutions for 5g security with service access service edge (sase) with service pro...
Invention Zero trust network access solution for 5g sase with explicit proxy. In some embodiments, a system...
Invention Visual deep learning for inline phishing detection. Techniques for visual deep learning for inlin...
Invention Deep learning in a data plane. Various techniques for deep learning in a data plane are disclosed...
Invention Secure access service edge interconnect platform. Techniques for providing security for providin...
Invention Zero trust network access solution for 5g sase with explicit proxy. In some embodiments, a syste...
Invention Securing control and user plane separation in mobile networks. Techniques for securing control a...
2024 Invention Preserving security information over nat enabled devices using encapsulation. A data packet is re...
Invention Service access service edge solution for providing enhanced security for mobile networks. Techni...
Invention Secure access service edge for mobile networks. Techniques for providing security for providing ...
Invention Ai-powered macros to process complex nlp queries across domains. Techniques for AI-powered macro...
P/S Software as a service (SAAS) services featuring software using artificial intelligence for the mo...
P/S Software as a service (SAAS) services featuring software using artificial intelligence for the m...
Invention Cve labeling for exploits using proof-of-concept and llm. The disclosed system determines a CVE ...
Invention Knowledge base and interface for efficient response to user queries. A knowledge base is built, ...
Invention Maintaining stable uniform resource locator verdicts with intelligent recrawling. A stable verdi...
Invention Detection of indirect prompt injection attacks with malicious instructions detection models. A m...
Invention Predicting cellular circuit bandwidth based on predicted channel conditions. A system generates ...
Invention Data path failure root cause identification with modified packets. A data path root cause analys...
Invention Visual deep learning for inline phishing detection. Techniques for visual deep learning for inli...
Invention Unstructured data extraction with large language models for query resolution. An unstructured da...
Invention Deep learning in a data plane. Various techniques for deep learning in a data plane are disclose...
Invention Deep learning for in-line detection of malicious command and control traffic from unstructured pa...
Invention Noise addition for differential privacy with preservation of data utility. Noise is added to dat...
Invention Prevention of man-in-the-middle phishing. Techniques for prevention of man-in-the-middle phishin...
Invention Machine learning-based content disarm and reconstruction with web browser prefetching. A web pag...
Invention Anycast addressing and policy-based forwarding configuration for multi-account configurations of ...
Invention Broken object level authorization vulnerability detection. Methods, storage systems and computer...
Invention Foundation model driven application that generates remediation actions for cloud resource misconf...
Invention Grammar powered retrieval augmented generation for domain specific languages. Techniques for gra...
Invention Scalable domain-level sinkholing and interaction of network traffic. A system, method, and devic...
Invention Automatic security coverage expansion of cloud security posture management (cspm) assets. A syst...
Invention User interface navigation for web applications with retrieval-augmented generation. An offline c...
Invention Training a model based on soft labeling. A method for cybersecurity includes receiving a corpus ...
Invention Pipeline for rewriting and validating malicious code with generative artificial intelligence. A ...
Invention Natural language query to domain-specific database query conversion with language models. A natu...
2022 P/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and...
P/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patt...
P/S Providing information, analytics and statistics about commodities for use in the field of financ...
P/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ...
P/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte...
P/S Providing on-line non-downloadable software for data mining, connecting with internet protocol ad...
P/S Promoting best practices and providing consumer information related to cybersecurity threat intel...
P/S Promoting best practices and consumer information related to cybersecurity threat intelligence a...
P/S Providing temporary use of non-downloadable software for autonomous threat detection, collection,...
2021 P/S Monitoring of computer systems for security purposes.
P/S Computer hardware, namely, firewalls and networks security devices in the nature of network route...
P/S Computer hardware, namely, firewalls and networks security devices in the nature of network rout...
P/S Consumer network security devices, namely, firewalls, routers, wifi hotspots, and mesh networks ...
P/S Providing nondownloadable instructional materials and guidelines in the field of computer softwar...
P/S Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ...
2020 P/S Computer hardware, namely, firewalls and network security devices; downloadable computer security...
P/S Computer hardware, namely, firewalls and network security devices; downloadable computer softwar...
P/S Computer hardware, namely, firewalls and network security devices; downloadable computer software...
P/S Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t...
P/S Downloadable computer software for monitoring, managing and securing computer systems and network...
2019 P/S Computer hardware, namely, firewalls and networks security devices; computer software for compute...