2024
|
P/S
|
Computer software; computer anti-adware software; computer anti-malware software; computer anti-s... |
|
P/S
|
Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg war... |
|
Invention
|
Streaming and filtering event objects into a data lake.
An asynchronous stream of security event... |
|
Invention
|
Data augmentation for threat investigation in an enterprise network.
An endpoint in an enterpris... |
|
Invention
|
Intrusion detection using a heartbeat.
Possible Denial of Service (DOS) activity is detected and... |
|
Invention
|
Centralized event detection.
A threat management facility stores a number of entity models that ... |
|
Invention
|
Agile policy management system.
The disclosure relates to deploying policy management rules to a... |
|
Invention
|
Kernel-based thread termination detection.
Malware attacks seek to exploit target computing syst... |
|
Invention
|
Web content filtering.
A large language model (LLM) is trained to classify Uniform Resource Loca... |
|
Invention
|
Encrypted cache protection.
Secrets such as secure session cookies for a web browser can be prot... |
|
Invention
|
Network-level elevated security execution modes for network-accessible devices.
Various aspects ... |
|
Invention
|
Elevated security execution mode for network-accessible devices.
Various aspects related to meth... |
2023
|
Invention
|
Risk based remote browser isolation.
The present disclosure relates to a computer-implemented me... |
|
Invention
|
Malware mitigation based on runtime memory allocation.
A compute instance is instrumented to det... |
|
Invention
|
Remote management of hosted services.
Remote services, such as security services, are onboarded ... |
|
Invention
|
Detecting tampering with hosted services.
Remote services, such as security services, are onboar... |
|
Invention
|
Methods and apparatus for detection of malicious documents using machine learning.
An apparatus ... |
|
Invention
|
Enterprise document classification.
A collection of documents or other files and the like within... |
|
Invention
|
Cloud-based resource discovery system and method.
Systems and methods for configuring a network ... |
|
Invention
|
Application firewall.
A firewall uses information about an application that originates a network... |
|
P/S
|
Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls |
|
Invention
|
Use of an application controller to monitor and control software file and application environment... |
|
Invention
|
Sensitive data detection.
A data set can be analyzed for the presence of sensitive data using ty... |
|
Invention
|
Detecting malware activity using kernel-based process discovery detection.
Malware attacks seek ... |
|
Invention
|
Monitoring process data acquisition and exfiltration.
A computer-implemented method includes ide... |
|
Invention
|
Augmented security recognition tasks.
A system for conducting a security recognition task, the s... |
|
P/S
|
(Based on Use in Commerce) (Based on 44(d) Priority Application) (Based on 44(e)) Authentication ... |
|
Invention
|
Stateful email detection using schemaless data fragments.
A computer-implemented method includes... |
|
P/S
|
Providing online non-downloadable digital goods, namely computer software, computer hardware, ele... |
|
Invention
|
Data plane framework for redirecting data packets.
A method for redirecting data packets include... |
|
Invention
|
Component testing framework.
A mock server is configured to mimic the operation of one or more m... |
|
Invention
|
Systems and methods for executing a command line interface command on remote devices from a centr... |
|
Invention
|
Network access using hardware-based security.
An endpoint device uses hardware-based security to... |
|
P/S
|
(Based on Intent to Use) 3D spectacles; Downloadable augmented reality software for virtual reali... |
|
P/S
|
Computer software; metaverse software; utility, security and cryptography software; computer soft... |
2022
|
Invention
|
Hybrid appliance for zero trust network access to customer applications.
A zero trust network ac... |
|
Invention
|
Dynamic routing of application traffic to ztna connectors.
A cloud computing platform provides z... |
|
Invention
|
Cloud-based zero trust network access service.
Infrastructure for zero trust network access (ZTN... |
|
Invention
|
Validation of ztna configuration for a multi-tenant proxy environment.
A cloud-based platform fo... |
|
Invention
|
Domain ownership verification for a ztna service platform.
A cloud computing platform provides z... |
|
Invention
|
Alias domains for accessing ztna applications.
A cloud computing platform provides zero trust ne... |
|
Invention
|
Scaling tunnels for zero trust network access appliances.
A cloud computing platform provides ze... |
|
Invention
|
Apparatus and methods for an application programming interface to detect and locate malware in me... |
|
Invention
|
Cloud-based zero trust network access services. Various modifications to a zero trust network acc... |
|
Invention
|
Systems and methods for implementing policy changes in multi-tenant environments. In one or more ... |
|
Invention
|
Logging configuration system and method.
Systems and methods for monitoring network activity. Th... |
|
Invention
|
Malicious application detection.
Systems and methods for methods network activity. The methods i... |
|
Invention
|
Security against physical keystroke simulation.
A computer-implemented method includes detecting... |
|
Invention
|
Signature reporting system and method.
Systems and methods for monitoring network activity. The ... |
|
Invention
|
Misconfigured mirror port detection. A method includes monitoring a plurality of packets received... |
|
Invention
|
Managing and classifying computer processes.
In a system and method for processing computer syst... |
|
Invention
|
Variable timeouts between operating modes of a computer for detecting malicious software.
A meth... |
|
Invention
|
Scanning for malware based on process identification.
Systems and methods to scan for malware on... |
|
Invention
|
Pausing automatic software updates of virtual machines.
Adapting automatic software update behav... |
|
P/S
|
(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones... |
|
P/S
|
(Based on 44(d) Priority Application) Downloadable computer software for controlling and managing... |
|
P/S
|
Downloadable computer software, downloadable computer programs, and downloadable mobile applicati... |
|
P/S
|
Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB computer security ke... |
|
P/S
|
Communication by computer terminals; Information transmission via electronic communications netwo... |
|
P/S
|
Computer hardware; wireless access points; computer
software, computer programs, and downloadabl... |
|
P/S
|
Computer hardware; wireless access points; computer software, computer programs, and downloadable... |
|
P/S
|
Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s... |
|
P/S
|
Computer hardware, namely, for data networking; Downloadable computer software for managing, conf... |
|
P/S
|
Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a... |
|
P/S
|
Computer programming services for the protection of software; data security services; computer so... |
|
P/S
|
Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat... |
|
P/S
|
Computer hardware; computer software; wireless access points; computer software, computer program... |
|
P/S
|
Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware... |
|
P/S
|
(Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documen... |
|
P/S
|
Downloadable security software to provide cybersecurity protection; computer hardware; wireless a... |
2021
|
P/S
|
(Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf... |
|
P/S
|
(Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ... |
|
P/S
|
Computer security consultancy; Computer virus protection services; Cloud computing featuring soft... |
|
P/S
|
Computer diagnostic services; Computer security consultancy; Computer security consultancy in the... |
|
P/S
|
Computer hardware; wireless access points devices namely, wireless routers; computer software, co... |
|
P/S
|
Computer hardware; wireless access points devices; computer
software, computer programs, and dow... |
|
P/S
|
Technical advice relating to operation of computers; technical support services, namely troublesh... |
|
P/S
|
Outsource service providers in the field of information
technology; technical advice relating to... |