Sophos Limited

Royaume‑Uni


 
Quantité totale PI 594
Quantité totale incluant filiales 596 (+ 2 pour les filiales)
Rang # Quantité totale PI 2 190
Note d'activité PI 3,4/5.0    467
Rang # Activité PI 1 543
Parent Sophos Holdings Limited
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

404 70
3 8
51 11
47
 
Dernier brevet 2025 - Cloud-based resource discovery s...
Premier brevet 1994 - Validity checking
Dernière marque 2024 - SOPHOS DEFEAT CYBERATTACKS
Première marque 1994 - SOPHOS

Filiales

1 subsidiaries with IP (0 patents, 2 trademarks)

1 subsidiaries without IP

 S'inscrire grtuitement pour accéder à la liste des filiales

Industrie (Classification de Nice)

Derniers inventions, produits et services

2024 P/S Computer software; computer anti-adware software; computer anti-malware software; computer anti-s...
P/S Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg war...
Invention Streaming and filtering event objects into a data lake. An asynchronous stream of security event...
Invention Data augmentation for threat investigation in an enterprise network. An endpoint in an enterpris...
Invention Intrusion detection using a heartbeat. Possible Denial of Service (DOS) activity is detected and...
Invention Centralized event detection. A threat management facility stores a number of entity models that ...
Invention Agile policy management system. The disclosure relates to deploying policy management rules to a...
Invention Kernel-based thread termination detection. Malware attacks seek to exploit target computing syst...
Invention Web content filtering. A large language model (LLM) is trained to classify Uniform Resource Loca...
Invention Encrypted cache protection. Secrets such as secure session cookies for a web browser can be prot...
Invention Network-level elevated security execution modes for network-accessible devices. Various aspects ...
Invention Elevated security execution mode for network-accessible devices. Various aspects related to meth...
2023 Invention Risk based remote browser isolation. The present disclosure relates to a computer-implemented me...
Invention Malware mitigation based on runtime memory allocation. A compute instance is instrumented to det...
Invention Remote management of hosted services. Remote services, such as security services, are onboarded ...
Invention Detecting tampering with hosted services. Remote services, such as security services, are onboar...
Invention Methods and apparatus for detection of malicious documents using machine learning. An apparatus ...
Invention Enterprise document classification. A collection of documents or other files and the like within...
Invention Cloud-based resource discovery system and method. Systems and methods for configuring a network ...
Invention Application firewall. A firewall uses information about an application that originates a network...
P/S Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls
Invention Use of an application controller to monitor and control software file and application environment...
Invention Sensitive data detection. A data set can be analyzed for the presence of sensitive data using ty...
Invention Detecting malware activity using kernel-based process discovery detection. Malware attacks seek ...
Invention Monitoring process data acquisition and exfiltration. A computer-implemented method includes ide...
Invention Augmented security recognition tasks. A system for conducting a security recognition task, the s...
P/S (Based on Use in Commerce) (Based on 44(d) Priority Application) (Based on 44(e)) Authentication ...
Invention Stateful email detection using schemaless data fragments. A computer-implemented method includes...
P/S Providing online non-downloadable digital goods, namely computer software, computer hardware, ele...
Invention Data plane framework for redirecting data packets. A method for redirecting data packets include...
Invention Component testing framework. A mock server is configured to mimic the operation of one or more m...
Invention Systems and methods for executing a command line interface command on remote devices from a centr...
Invention Network access using hardware-based security. An endpoint device uses hardware-based security to...
P/S (Based on Intent to Use) 3D spectacles; Downloadable augmented reality software for virtual reali...
P/S Computer software; metaverse software; utility, security and cryptography software; computer soft...
2022 Invention Hybrid appliance for zero trust network access to customer applications. A zero trust network ac...
Invention Dynamic routing of application traffic to ztna connectors. A cloud computing platform provides z...
Invention Cloud-based zero trust network access service. Infrastructure for zero trust network access (ZTN...
Invention Validation of ztna configuration for a multi-tenant proxy environment. A cloud-based platform fo...
Invention Domain ownership verification for a ztna service platform. A cloud computing platform provides z...
Invention Alias domains for accessing ztna applications. A cloud computing platform provides zero trust ne...
Invention Scaling tunnels for zero trust network access appliances. A cloud computing platform provides ze...
Invention Apparatus and methods for an application programming interface to detect and locate malware in me...
Invention Cloud-based zero trust network access services. Various modifications to a zero trust network acc...
Invention Systems and methods for implementing policy changes in multi-tenant environments. In one or more ...
Invention Logging configuration system and method. Systems and methods for monitoring network activity. Th...
Invention Malicious application detection. Systems and methods for methods network activity. The methods i...
Invention Security against physical keystroke simulation. A computer-implemented method includes detecting...
Invention Signature reporting system and method. Systems and methods for monitoring network activity. The ...
Invention Misconfigured mirror port detection. A method includes monitoring a plurality of packets received...
Invention Managing and classifying computer processes. In a system and method for processing computer syst...
Invention Variable timeouts between operating modes of a computer for detecting malicious software. A meth...
Invention Scanning for malware based on process identification. Systems and methods to scan for malware on...
Invention Pausing automatic software updates of virtual machines. Adapting automatic software update behav...
P/S (Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones...
P/S (Based on 44(d) Priority Application) Downloadable computer software for controlling and managing...
P/S Downloadable computer software, downloadable computer programs, and downloadable mobile applicati...
P/S Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB computer security ke...
P/S Communication by computer terminals; Information transmission via electronic communications netwo...
P/S Computer hardware; wireless access points; computer software, computer programs, and downloadabl...
P/S Computer hardware; wireless access points; computer software, computer programs, and downloadable...
P/S Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s...
P/S Computer hardware, namely, for data networking; Downloadable computer software for managing, conf...
P/S Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a...
P/S Computer programming services for the protection of software; data security services; computer so...
P/S Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat...
P/S Computer hardware; computer software; wireless access points; computer software, computer program...
P/S Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware...
P/S (Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documen...
P/S Downloadable security software to provide cybersecurity protection; computer hardware; wireless a...
2021 P/S (Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf...
P/S (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ...
P/S Computer security consultancy; Computer virus protection services; Cloud computing featuring soft...
P/S Computer diagnostic services; Computer security consultancy; Computer security consultancy in the...
P/S Computer hardware; wireless access points devices namely, wireless routers; computer software, co...
P/S Computer hardware; wireless access points devices; computer software, computer programs, and dow...
P/S Technical advice relating to operation of computers; technical support services, namely troublesh...
P/S Outsource service providers in the field of information technology; technical advice relating to...