Palo Alto Networks, Inc.

États‑Unis d’Amérique


 
Quantité totale PI 1 206
Quantité totale incluant filiales 1 207 (+ 1 pour les filiales)
Rang # Quantité totale PI 1 111
Note d'activité PI 3,7/5.0    1 085
Rang # Activité PI 680
Symbole boursier
ISIN US6974351057
Capitalisation 127,600M  (USD)
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

1 050 29
4 17
86 12
8
 
Dernier brevet 2025 - Security rule conversion and per...
Premier brevet 1994 - Remote smart filtering communica...
Dernière marque 2025 - CORTEX CLOUD
Première marque 2007 - PAN-OS

Filiales

1 subsidiaries with IP (1 patents, 0 trademarks)

 S'inscrire grtuitement pour accéder à la liste des filiales

Industrie (Classification de Nice)

Derniers inventions, produits et services

2025 P/S Downloadable computer software for computer network security; downloadable computer software for ...
P/S Software as a service (SAAS) services featuring software for use in computer network security; so...
Invention Flow metadata exchanges between network and security functions for a security service. In some e...
Invention Application precedence based traffic policy enforcement. Assigning priority values to applicatio...
Invention Context-based security in mobile networks using an api and a data store. Techniques for applying...
Invention Remote attack surface discovery and management. Techniques for identifying and managing an organ...
Invention Unified parked domain detection system. The present application discloses a method, system, and ...
P/S Providing temporary use of online non-downloadable cloud native software application protection p...
2024 Invention Identifying devices with multiple network interface cards in a network. A service obtains traffi...
Invention Detection of replacement/copy-paste attacks through monitoring and classifying api function invoc...
Invention Identifying malware based on system api function pointers. Techniques for identifying malware ba...
Invention Intelligent deployment region selection and scaling of cloud-based firewalls. Automated, intelli...
Invention Iot security event correlation. Correlating Internet of Things (IoT) security events is disclose...
Invention Multiple data center compatible deployment of applications matching a wildcard domain name. A net...
Invention Natural language to customize data visualization. A system, method, and device for generating da...
Invention Security platform with external inline processing of assembled selected traffic. Techniques for ...
Invention Detecting microsoft windows installer malware using text classification models. The present appl...
Invention Malicious c&c channel to fixed ip detection using ping packets. A method for protecting a comput...
Invention Malicious c&c channel to fixed ip detection based on packet volume. A method for protecting a co...
Invention Suspension and disabling of faulting devices powered through power over ethernet. Power sourcing...
Invention Supporting zone-based policy enforcement for a firewall connected to a one-arm load balancer. A ...
Invention Configuring application availability using anycast addressing. Anycast addressing is utilized to ...
Invention Centralized identity redistribution. Techniques for providing centralized identity redistributio...
Invention Automated code signature generation for windows.net binaries. Various embodiments provide a syste...
Invention Neural dialogue system for security posture management. A neural dialogue system has been designe...
Invention Organization-specific cybersecurity dialogue system with large language models. An organization-s...
Invention Intelligent security for zero trust in mobile networks with security platforms using a packet for...
Invention Resource monitoring and auditing. A method for monitoring activity of a user interacting with a ...
P/S Software as a service (SAAS) services featuring software using artificial intelligence for the mo...
P/S Software as a service (SAAS) services featuring software using artificial intelligence for the m...
Invention Mitigating phishing attempts. Credential phishing attack mitigation is disclosed. A URL that is ...
2023 Invention Threat intelligence dialogue system for interfacing with a proprietary threat intelligence databa...
Invention Security rule conversion and performance evaluation. A cybersecurity rule conversion system (“co...
Invention Multiple data center compatible deployment of applications matching a wildcard domain name. A ne...
Invention Real time coaching and prevention of human-centric security vulnerabilities. The disclosed syste...
Invention Intelligent security for zero trust in mobile networks with security platforms using a diameter p...
Invention Context-based cyberattack signature generation with large language models. A context-based cyber...
Invention Application programming interface intent based behavior summarization. A generative artificial i...
Invention Automated satellite device authentication to a portal for secure remote access. Techniques for a...
Invention Security alert prioritization for cloud-based resources. Methods, storage systems and computer p...
Invention Data centric approach for supporting multiple inline cloud services. Techniques for a data centr...
Invention Machine learning for prioritizing traffic in multi-purpose inline cloud analysis (mica) to enhanc...
Invention Configuring application availability using anycast addressing. Anycast addressing is utilized to...
Invention Iot policy recommendation large language model (llm) embeddings based global behavior learning. T...
Invention Automated code signature generation for windows .net binaries. Various embodiments provide a sys...
Invention Identity and access management informed attack path discovery. A resource attack path detector p...
Invention Neural dialogue system for security posture management. A neural dialogue system has been design...
Invention Organization-specific cybersecurity dialogue system with large language models. An organization-...
Invention Adversarial training for malicious protocol data unit detection with field value perturbations. ...
Invention Quantum ready intelligent security gateway. Techniques for applying a quantum ready intelligent ...
Invention Methods to detect malicious stockpiled domain names. The present application discloses a method,...
Invention Large language model (llm) guided robust learning system design for c2 detection. Various embodi...
Invention Cloud computer credential theft detection. Methods, storage systems and computer program product...
Invention Machine learning-based filtering of false positive pattern matches for personally identifiable in...
2022 P/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and...
P/S Providing information, analytics and statistics about commodities for use in the field of financ...
P/S Providing temporary use of non-downloadable software for autonomous threat detection, collection,...
P/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte...
P/S Providing on-line non-downloadable software for data mining, connecting with internet protocol ad...
P/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patt...
P/S Promoting best practices and providing consumer information related to cybersecurity threat intel...
P/S Promoting best practices and consumer information related to cybersecurity threat intelligence a...
2021 P/S Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth...
P/S Monitoring of computer systems for security purposes.
P/S Computer hardware, namely, firewalls and networks security devices in the nature of network route...
P/S Computer hardware, namely, firewalls and networks security devices in the nature of network rout...
P/S Consumer network security devices, namely, firewalls, routers, wifi hotspots, and mesh networks ...
P/S Providing nondownloadable instructional materials and guidelines in the field of computer softwar...
P/S Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ...
2020 P/S Computer hardware, namely, firewalls and network security devices; downloadable computer security...
P/S Computer hardware, namely, firewalls and network security devices; downloadable computer softwar...
P/S Computer hardware, namely, firewalls and network security devices; downloadable computer software...
P/S Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t...
P/S Downloadable computer software for monitoring, managing and securing computer systems and network...
2019 P/S Computer hardware, namely, firewalls and networks security devices; computer software for compute...
P/S Downloadable computer software for computer network security, namely downloadable computer securi...
P/S Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits...
P/S Providing a database featuring information, analytics and statistics about commodities for use i...
P/S downloadable computer software for computer network security technical support services, namely, ...
P/S Technological consultation in the field of computer networking and network security, excluding te...
2018 P/S Providing temporary use of non-downloadable computer software for browsing and accessing computer...
2017 P/S Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malw...