2025
|
P/S
|
Downloadable computer software for computer network security; downloadable computer software for ... |
|
P/S
|
Software as a service (SAAS) services featuring software for use in computer network security; so... |
|
Invention
|
Flow metadata exchanges between network and security functions for a security service.
In some e... |
|
Invention
|
Application precedence based traffic policy enforcement.
Assigning priority values to applicatio... |
|
Invention
|
Context-based security in mobile networks using an api and a data store.
Techniques for applying... |
|
Invention
|
Remote attack surface discovery and management.
Techniques for identifying and managing an organ... |
|
Invention
|
Unified parked domain detection system.
The present application discloses a method, system, and ... |
|
P/S
|
Providing temporary use of online non-downloadable cloud native software application protection p... |
2024
|
Invention
|
Identifying devices with multiple network interface cards in a network.
A service obtains traffi... |
|
Invention
|
Detection of replacement/copy-paste attacks through monitoring and classifying api function invoc... |
|
Invention
|
Identifying malware based on system api function pointers.
Techniques for identifying malware ba... |
|
Invention
|
Intelligent deployment region selection and scaling of cloud-based firewalls.
Automated, intelli... |
|
Invention
|
Iot security event correlation.
Correlating Internet of Things (IoT) security events is disclose... |
|
Invention
|
Multiple data center compatible deployment of applications matching a wildcard domain name. A net... |
|
Invention
|
Natural language to customize data visualization.
A system, method, and device for generating da... |
|
Invention
|
Security platform with external inline processing of assembled selected traffic.
Techniques for ... |
|
Invention
|
Detecting microsoft windows installer malware using text classification models.
The present appl... |
|
Invention
|
Malicious c&c channel to fixed ip detection using ping packets.
A method for protecting a comput... |
|
Invention
|
Malicious c&c channel to fixed ip detection based on packet volume.
A method for protecting a co... |
|
Invention
|
Suspension and disabling of faulting devices powered through power over ethernet.
Power sourcing... |
|
Invention
|
Supporting zone-based policy enforcement for a firewall connected to a one-arm load balancer.
A ... |
|
Invention
|
Configuring application availability using anycast addressing. Anycast addressing is utilized to ... |
|
Invention
|
Centralized identity redistribution.
Techniques for providing centralized identity redistributio... |
|
Invention
|
Automated code signature generation for windows.net binaries. Various embodiments provide a syste... |
|
Invention
|
Neural dialogue system for security posture management. A neural dialogue system has been designe... |
|
Invention
|
Organization-specific cybersecurity dialogue system with large language models. An organization-s... |
|
Invention
|
Intelligent security for zero trust in mobile networks with security platforms using a packet for... |
|
Invention
|
Resource monitoring and auditing.
A method for monitoring activity of a user interacting with a ... |
|
P/S
|
Software as a service (SAAS) services featuring software using artificial intelligence for the mo... |
|
P/S
|
Software as a service (SAAS) services featuring software
using artificial intelligence for the m... |
|
Invention
|
Mitigating phishing attempts.
Credential phishing attack mitigation is disclosed. A URL that is ... |
2023
|
Invention
|
Threat intelligence dialogue system for interfacing with a proprietary threat intelligence databa... |
|
Invention
|
Security rule conversion and performance evaluation.
A cybersecurity rule conversion system (“co... |
|
Invention
|
Multiple data center compatible deployment of applications matching a wildcard domain name.
A ne... |
|
Invention
|
Real time coaching and prevention of human-centric security vulnerabilities.
The disclosed syste... |
|
Invention
|
Intelligent security for zero trust in mobile networks with security platforms using a diameter p... |
|
Invention
|
Context-based cyberattack signature generation with large language models.
A context-based cyber... |
|
Invention
|
Application programming interface intent based behavior summarization.
A generative artificial i... |
|
Invention
|
Automated satellite device authentication to a portal for secure remote access.
Techniques for a... |
|
Invention
|
Security alert prioritization for cloud-based resources.
Methods, storage systems and computer p... |
|
Invention
|
Data centric approach for supporting multiple inline cloud services.
Techniques for a data centr... |
|
Invention
|
Machine learning for prioritizing traffic in multi-purpose inline cloud analysis (mica) to enhanc... |
|
Invention
|
Configuring application availability using anycast addressing.
Anycast addressing is utilized to... |
|
Invention
|
Iot policy recommendation large language model (llm) embeddings based global behavior learning. T... |
|
Invention
|
Automated code signature generation for windows .net binaries.
Various embodiments provide a sys... |
|
Invention
|
Identity and access management informed attack path discovery.
A resource attack path detector p... |
|
Invention
|
Neural dialogue system for security posture management.
A neural dialogue system has been design... |
|
Invention
|
Organization-specific cybersecurity dialogue system with large language models.
An organization-... |
|
Invention
|
Adversarial training for malicious protocol data unit detection with field value perturbations.
... |
|
Invention
|
Quantum ready intelligent security gateway.
Techniques for applying a quantum ready intelligent ... |
|
Invention
|
Methods to detect malicious stockpiled domain names.
The present application discloses a method,... |
|
Invention
|
Large language model (llm) guided robust learning system design for c2 detection.
Various embodi... |
|
Invention
|
Cloud computer credential theft detection.
Methods, storage systems and computer program product... |
|
Invention
|
Machine learning-based filtering of false positive pattern matches for personally identifiable in... |
2022
|
P/S
|
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and... |
|
P/S
|
Providing information, analytics and statistics about
commodities for use in the field of financ... |
|
P/S
|
Providing temporary use of non-downloadable software for autonomous threat detection, collection,... |
|
P/S
|
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte... |
|
P/S
|
Providing on-line non-downloadable software for data mining, connecting with internet protocol ad... |
|
P/S
|
Downloadable software and applications for detecting,
collecting, monitoring, and analyzing patt... |
|
P/S
|
Promoting best practices and providing consumer information related to cybersecurity threat intel... |
|
P/S
|
Promoting best practices and consumer information related to
cybersecurity threat intelligence a... |
2021
|
P/S
|
Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth... |
|
P/S
|
Monitoring of computer systems for security purposes. |
|
P/S
|
Computer hardware, namely, firewalls and networks security devices in the nature of network route... |
|
P/S
|
Computer hardware, namely, firewalls and networks security
devices in the nature of network rout... |
|
P/S
|
Consumer network security devices, namely, firewalls,
routers, wifi hotspots, and mesh networks ... |
|
P/S
|
Providing nondownloadable instructional materials and guidelines in the field of computer softwar... |
|
P/S
|
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ... |
2020
|
P/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer security... |
|
P/S
|
Computer hardware, namely, firewalls and network security
devices; downloadable computer softwar... |
|
P/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer software... |
|
P/S
|
Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t... |
|
P/S
|
Downloadable computer software for monitoring, managing and securing computer systems and network... |
2019
|
P/S
|
Computer hardware, namely, firewalls and networks security devices; computer software for compute... |
|
P/S
|
Downloadable computer software for computer network security, namely downloadable computer securi... |
|
P/S
|
Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits... |
|
P/S
|
Providing a database featuring information, analytics and
statistics about commodities for use i... |
|
P/S
|
downloadable computer software for computer network security technical support services, namely, ... |
|
P/S
|
Technological consultation in the field of computer networking and network security, excluding te... |
2018
|
P/S
|
Providing temporary use of non-downloadable computer software for browsing and accessing computer... |
2017
|
P/S
|
Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malw... |