|
2025
|
P/S
|
Computer hardware; Downloadable security software for sharing and storing sensitive information o... |
|
|
P/S
|
Downloadable computer software for an enterprise browser for secure web browsing, internet access... |
|
|
P/S
|
Downloadable computer software for computer network security protection; Downloadable computer so... |
|
|
P/S
|
platform as a service (PAAS) featuring computer software platforms for managing unified data in t... |
|
|
P/S
|
Platform as a service (PAAS) featuring computer software platforms for managing unified data in t... |
|
|
P/S
|
Downloadable computer software for computer network security; Downloadable computer software for ... |
|
|
Invention
|
Malware detection for documents using knowledge distillation assisted learning.
The detection of... |
|
|
P/S
|
Providing temporary use of online non-downloadable cloud native software application protection p... |
|
|
P/S
|
Providing temporary use of online non-downloadable cloud
native software application protection ... |
|
|
Invention
|
Sd-wan iot security posture management.
Increasing use of web-based applications or Software-as-... |
|
|
Invention
|
High availability of cloud-based services with address translation.
Described herein are systems... |
|
|
Invention
|
Multiple data center compatible deployment of applications matching a wildcard domain name.
A ne... |
|
|
P/S
|
Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth... |
|
|
Invention
|
Network attack detection with targeted feature extraction from exploit tools.
The present applic... |
|
|
Invention
|
Selective intelligent enforcement in mobile networks.
In some embodiments, a system/process/comp... |
|
|
Invention
|
Combined structure and import behavior signatures based malware learning and detection.
A system... |
|
|
Invention
|
Strategically aged domain detection.
Detection of strategically aged domains is detected. A set ... |
|
|
Invention
|
Detecting phishing pdfs with an image-based deep learning approach.
The detection of phishing Po... |
|
|
Invention
|
Dynamically scalable application firewall deployment for cloud native applications.
A configurat... |
|
|
P/S
|
Downloadable computer software for use as a security platform with security operations capabiliti... |
|
|
P/S
|
Downloadable computer software for computer network security; downloadable computer software for ... |
|
|
Invention
|
Secure access service edge for mobile networks. Techniques for providing security for providing S... |
|
|
Invention
|
Service access service edge solution for providing enhanced security for unmanaged devices for mo... |
|
|
Invention
|
Service access service edge solution for providing enhanced security for mobile networks. Techniq... |
|
|
Invention
|
Explicit proxy solutions for 5g security with service access service edge (sase) with service pro... |
|
|
Invention
|
Zero trust network access solution for 5g sase with explicit proxy. In some embodiments, a system... |
|
|
Invention
|
Visual deep learning for inline phishing detection. Techniques for visual deep learning for inlin... |
|
|
Invention
|
Deep learning in a data plane. Various techniques for deep learning in a data plane are disclosed... |
|
|
Invention
|
Secure access service edge interconnect platform.
Techniques for providing security for providin... |
|
|
Invention
|
Zero trust network access solution for 5g sase with explicit proxy.
In some embodiments, a syste... |
|
|
Invention
|
Securing control and user plane separation in mobile networks.
Techniques for securing control a... |
|
2024
|
Invention
|
Preserving security information over nat enabled devices using encapsulation. A data packet is re... |
|
|
Invention
|
Service access service edge solution for providing enhanced security for mobile networks.
Techni... |
|
|
Invention
|
Secure access service edge for mobile networks.
Techniques for providing security for providing ... |
|
|
Invention
|
Ai-powered macros to process complex nlp queries across domains.
Techniques for AI-powered macro... |
|
|
P/S
|
Software as a service (SAAS) services featuring software using artificial intelligence for the mo... |
|
|
P/S
|
Software as a service (SAAS) services featuring software
using artificial intelligence for the m... |
|
|
Invention
|
Cve labeling for exploits using proof-of-concept and llm.
The disclosed system determines a CVE ... |
|
|
Invention
|
Knowledge base and interface for efficient response to user queries.
A knowledge base is built, ... |
|
|
Invention
|
Maintaining stable uniform resource locator verdicts with intelligent recrawling.
A stable verdi... |
|
|
Invention
|
Detection of indirect prompt injection attacks with malicious instructions detection models.
A m... |
|
|
Invention
|
Predicting cellular circuit bandwidth based on predicted channel conditions.
A system generates ... |
|
|
Invention
|
Data path failure root cause identification with modified packets.
A data path root cause analys... |
|
|
Invention
|
Visual deep learning for inline phishing detection.
Techniques for visual deep learning for inli... |
|
|
Invention
|
Unstructured data extraction with large language models for query resolution.
An unstructured da... |
|
|
Invention
|
Deep learning in a data plane.
Various techniques for deep learning in a data plane are disclose... |
|
|
Invention
|
Deep learning for in-line detection of malicious command and control traffic from unstructured pa... |
|
|
Invention
|
Noise addition for differential privacy with preservation of data utility.
Noise is added to dat... |
|
|
Invention
|
Prevention of man-in-the-middle phishing.
Techniques for prevention of man-in-the-middle phishin... |
|
|
Invention
|
Machine learning-based content disarm and reconstruction with web browser prefetching.
A web pag... |
|
|
Invention
|
Anycast addressing and policy-based forwarding configuration for multi-account configurations of ... |
|
|
Invention
|
Broken object level authorization vulnerability detection.
Methods, storage systems and computer... |
|
|
Invention
|
Foundation model driven application that generates remediation actions for cloud resource misconf... |
|
|
Invention
|
Grammar powered retrieval augmented generation for domain specific languages.
Techniques for gra... |
|
|
Invention
|
Scalable domain-level sinkholing and interaction of network traffic.
A system, method, and devic... |
|
|
Invention
|
Automatic security coverage expansion of cloud security posture management (cspm) assets.
A syst... |
|
|
Invention
|
User interface navigation for web applications with retrieval-augmented generation.
An offline c... |
|
|
Invention
|
Training a model based on soft labeling.
A method for cybersecurity includes receiving a corpus ... |
|
|
Invention
|
Pipeline for rewriting and validating malicious code with generative artificial intelligence.
A ... |
|
|
Invention
|
Natural language query to domain-specific database query conversion with language models.
A natu... |
|
2022
|
P/S
|
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and... |
|
|
P/S
|
Downloadable software and applications for detecting,
collecting, monitoring, and analyzing patt... |
|
|
P/S
|
Providing information, analytics and statistics about
commodities for use in the field of financ... |
|
|
P/S
|
Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ... |
|
|
P/S
|
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte... |
|
|
P/S
|
Providing on-line non-downloadable software for data mining, connecting with internet protocol ad... |
|
|
P/S
|
Promoting best practices and providing consumer information related to cybersecurity threat intel... |
|
|
P/S
|
Promoting best practices and consumer information related to
cybersecurity threat intelligence a... |
|
|
P/S
|
Providing temporary use of non-downloadable software for autonomous threat detection, collection,... |
|
2021
|
P/S
|
Monitoring of computer systems for security purposes. |
|
|
P/S
|
Computer hardware, namely, firewalls and networks security devices in the nature of network route... |
|
|
P/S
|
Computer hardware, namely, firewalls and networks security
devices in the nature of network rout... |
|
|
P/S
|
Consumer network security devices, namely, firewalls,
routers, wifi hotspots, and mesh networks ... |
|
|
P/S
|
Providing nondownloadable instructional materials and guidelines in the field of computer softwar... |
|
|
P/S
|
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ... |
|
2020
|
P/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer security... |
|
|
P/S
|
Computer hardware, namely, firewalls and network security
devices; downloadable computer softwar... |
|
|
P/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer software... |
|
|
P/S
|
Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t... |
|
|
P/S
|
Downloadable computer software for monitoring, managing and securing computer systems and network... |
|
2019
|
P/S
|
Computer hardware, namely, firewalls and networks security devices; computer software for compute... |