2025
|
P/S
|
Computer software; Artificial intelligence software; machine learning software; threat detection ... |
2024
|
Invention
|
Misconfigured mirror port detection.
A method includes monitoring a plurality of packets receive... |
|
P/S
|
Computer software; computer anti-adware software; computer anti-malware software; computer anti-s... |
|
P/S
|
Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg war... |
|
Invention
|
Methods and apparatus for visualization of machine learning malware detection models.
Embodiment... |
|
Invention
|
Aggregating security events.
A stream of events is received at a local security agent running on... |
|
Invention
|
Zero trust network access connector for customer premises.
A zero trust network access (ZTNA) sy... |
|
Invention
|
Websocket server for cloud-based zero trust network access data plane.
In order to efficiently m... |
|
Invention
|
Load balancing for cloud-based zero trust network access data plane.
In a cloud-based data plane... |
|
Invention
|
Incremental enrichment of threat data.
A threat management facility receives data from a variety... |
|
Invention
|
Streaming and filtering event objects into a data lake.
An asynchronous stream of security event... |
|
Invention
|
Endpoint with remotely programmable data recorder.
An endpoint coupled in a communicating relati... |
|
Invention
|
Security integration for cloud services.
A threat management facility for an enterprise network ... |
|
Invention
|
Data augmentation for threat investigation in an enterprise network.
An endpoint in an enterpris... |
|
Invention
|
Intrusion detection using a heartbeat.
Possible Denial of Service (DOS) activity is detected and... |
|
Invention
|
Centralized event detection.
A threat management facility stores a number of entity models that ... |
|
Invention
|
Agile policy management system.
The disclosure relates to deploying policy management rules to a... |
|
Invention
|
Kernel-based thread termination detection.
Malware attacks seek to exploit target computing syst... |
|
Invention
|
Web content filtering.
A large language model (LLM) is trained to classify Uniform Resource Loca... |
|
Invention
|
Encrypted cache protection.
Secrets such as secure session cookies for a web browser can be prot... |
|
Invention
|
Network-level elevated security execution modes for network-accessible devices.
Various aspects ... |
|
Invention
|
Elevated security execution mode for network-accessible devices.
Various aspects related to meth... |
2023
|
Invention
|
Risk based remote browser isolation.
The present disclosure relates to a computer-implemented me... |
|
Invention
|
Malware mitigation based on runtime memory allocation. A compute instance is instrumented to dete... |
|
Invention
|
Remote management of hosted services.
Remote services, such as security services, are onboarded ... |
|
Invention
|
Detecting tampering with hosted services.
Remote services, such as security services, are onboar... |
|
Invention
|
Systems and methods for updating a network appliance.
Systems and methods for updating a network... |
|
Invention
|
Malicious enumeration attack detection.
A computer system implemented method includes receiving ... |
|
Invention
|
Enterprise document classification.
A collection of documents or other files and the like within... |
|
Invention
|
Guiding configuration of a switch stack.
In one embodiment, techniques are provided to guide a u... |
|
Invention
|
Classification using neighborhood resident analysis.
A computer system implemented method for de... |
|
Invention
|
Cloud-based resource discovery system and method.
Systems and methods for configuring a network ... |
|
Invention
|
Systems and methods for processing electronic communications.
Systems and methods for processing... |
|
Invention
|
Application firewall. A firewall uses information about an application that originates a network ... |
|
P/S
|
Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls |
|
Invention
|
Techniques for monitoring usage of a dynamically bound method of a software object.
In example e... |
|
Invention
|
Detecting malware activity using kernel-based process discovery detection.
Malware attacks seek ... |
|
Invention
|
Monitoring process data acquisition and exfiltration.
A computer-implemented method includes ide... |
|
P/S
|
(Based on Use in Commerce) (Based on 44(d) Priority Application) (Based on 44(e)) Authentication ... |
|
Invention
|
Stateful email detection using schemaless data fragments.
A computer-implemented method includes... |
|
P/S
|
Providing online non-downloadable digital goods, namely computer software, computer hardware, ele... |
|
Invention
|
Data plane framework for redirecting data packets.
A method for redirecting data packets include... |
|
Invention
|
Component testing framework.
A mock server is configured to mimic the operation of one or more m... |
|
Invention
|
Systems and methods for executing a command line interface command on remote devices from a centr... |
|
P/S
|
3D spectacles; Downloadable augmented reality software for virtual reality; Downloadable cloud-co... |
|
P/S
|
Computer software; metaverse software; utility, security and cryptography software; computer soft... |
2022
|
Invention
|
Apparatus and methods for an application programming interface to detect and locate malware in me... |
|
Invention
|
Logging configuration system and method.
Systems and methods for monitoring network activity. Th... |
|
Invention
|
Malicious application detection.
Systems and methods for methods network activity. The methods i... |
|
Invention
|
Security against physical keystroke simulation.
A computer-implemented method includes detecting... |
|
Invention
|
Signature reporting system and method.
Systems and methods for monitoring network activity. The ... |
|
Invention
|
Misconfigured mirror port detection. A method includes monitoring a plurality of packets received... |
|
Invention
|
Managing and classifying computer processes. In a system and method for processing computer syste... |
|
Invention
|
Variable timeouts between operating modes of a computer for detecting malicious software.
A meth... |
|
Invention
|
Scanning for malware based on process identification.
Systems and methods to scan for malware on... |
|
P/S
|
(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones... |
|
P/S
|
(Based on 44(d) Priority Application) Downloadable computer software for controlling and managing... |
|
P/S
|
Downloadable computer software, downloadable computer programs, and downloadable mobile applicati... |
|
P/S
|
Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB computer security ke... |
|
P/S
|
Communication by computer terminals; Information transmission via electronic communications netwo... |
|
P/S
|
Computer hardware; wireless access points; computer
software, computer programs, and downloadabl... |
|
P/S
|
Computer hardware; wireless access points; computer software, computer programs, and downloadable... |
|
P/S
|
Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s... |
|
P/S
|
Computer hardware, namely, for data networking; Downloadable computer software for managing, conf... |
|
P/S
|
Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a... |
|
P/S
|
Computer programming services for the protection of software; data security services; computer so... |
|
P/S
|
Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat... |
|
P/S
|
Computer hardware; computer software; wireless access points; computer software, computer program... |
|
P/S
|
Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware... |
|
P/S
|
(Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documen... |
|
P/S
|
Downloadable security software to provide cybersecurity protection; computer hardware; wireless a... |
2021
|
P/S
|
(Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf... |
|
P/S
|
(Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ... |
|
P/S
|
Computer security consultancy; Computer virus protection services; Cloud computing featuring soft... |
|
P/S
|
Computer diagnostic services; Computer security consultancy; Computer security consultancy in the... |
|
P/S
|
Computer hardware; wireless access points devices namely, wireless routers; computer software, co... |
|
P/S
|
Computer hardware; wireless access points devices; computer
software, computer programs, and dow... |
|
P/S
|
Technical advice relating to operation of computers; technical support services, namely troublesh... |