Sophos Limited

Royaume‑Uni


 
Quantité totale PI 609
Quantité totale incluant filiales 611 (+ 2 pour les filiales)
Rang # Quantité totale PI 2 142
Note d'activité PI 3,4/5.0    479
Rang # Activité PI 1 513
Parent Sophos Holdings Limited
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

418 70
3 8
51 11
48
 
Dernier brevet 2025 - Malicious enumeration attack det...
Premier brevet 1994 - Validity checking
Dernière marque 2025 - SOPHOS AI
Première marque 1994 - SOPHOS

Filiales

1 subsidiaries with IP (0 patents, 2 trademarks)

1 subsidiaries without IP

 S'inscrire grtuitement pour accéder à la liste des filiales

Industrie (Classification de Nice)

Derniers inventions, produits et services

2025 P/S Computer software; Artificial intelligence software; machine learning software; threat detection ...
2024 Invention Misconfigured mirror port detection. A method includes monitoring a plurality of packets receive...
P/S Computer software; computer anti-adware software; computer anti-malware software; computer anti-s...
P/S Footwear; Gloves; Pants; Shirts; Socks; Vests; Baseball caps and hats; Cyclists' jerseys; Leg war...
Invention Methods and apparatus for visualization of machine learning malware detection models. Embodiment...
Invention Aggregating security events. A stream of events is received at a local security agent running on...
Invention Zero trust network access connector for customer premises. A zero trust network access (ZTNA) sy...
Invention Websocket server for cloud-based zero trust network access data plane. In order to efficiently m...
Invention Load balancing for cloud-based zero trust network access data plane. In a cloud-based data plane...
Invention Incremental enrichment of threat data. A threat management facility receives data from a variety...
Invention Streaming and filtering event objects into a data lake. An asynchronous stream of security event...
Invention Endpoint with remotely programmable data recorder. An endpoint coupled in a communicating relati...
Invention Security integration for cloud services. A threat management facility for an enterprise network ...
Invention Data augmentation for threat investigation in an enterprise network. An endpoint in an enterpris...
Invention Intrusion detection using a heartbeat. Possible Denial of Service (DOS) activity is detected and...
Invention Centralized event detection. A threat management facility stores a number of entity models that ...
Invention Agile policy management system. The disclosure relates to deploying policy management rules to a...
Invention Kernel-based thread termination detection. Malware attacks seek to exploit target computing syst...
Invention Web content filtering. A large language model (LLM) is trained to classify Uniform Resource Loca...
Invention Encrypted cache protection. Secrets such as secure session cookies for a web browser can be prot...
Invention Network-level elevated security execution modes for network-accessible devices. Various aspects ...
Invention Elevated security execution mode for network-accessible devices. Various aspects related to meth...
2023 Invention Risk based remote browser isolation. The present disclosure relates to a computer-implemented me...
Invention Malware mitigation based on runtime memory allocation. A compute instance is instrumented to dete...
Invention Remote management of hosted services. Remote services, such as security services, are onboarded ...
Invention Detecting tampering with hosted services. Remote services, such as security services, are onboar...
Invention Systems and methods for updating a network appliance. Systems and methods for updating a network...
Invention Malicious enumeration attack detection. A computer system implemented method includes receiving ...
Invention Enterprise document classification. A collection of documents or other files and the like within...
Invention Guiding configuration of a switch stack. In one embodiment, techniques are provided to guide a u...
Invention Classification using neighborhood resident analysis. A computer system implemented method for de...
Invention Cloud-based resource discovery system and method. Systems and methods for configuring a network ...
Invention Systems and methods for processing electronic communications. Systems and methods for processing...
Invention Application firewall. A firewall uses information about an application that originates a network ...
P/S Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls
Invention Techniques for monitoring usage of a dynamically bound method of a software object. In example e...
Invention Detecting malware activity using kernel-based process discovery detection. Malware attacks seek ...
Invention Monitoring process data acquisition and exfiltration. A computer-implemented method includes ide...
P/S (Based on Use in Commerce) (Based on 44(d) Priority Application) (Based on 44(e)) Authentication ...
Invention Stateful email detection using schemaless data fragments. A computer-implemented method includes...
P/S Providing online non-downloadable digital goods, namely computer software, computer hardware, ele...
Invention Data plane framework for redirecting data packets. A method for redirecting data packets include...
Invention Component testing framework. A mock server is configured to mimic the operation of one or more m...
Invention Systems and methods for executing a command line interface command on remote devices from a centr...
P/S 3D spectacles; Downloadable augmented reality software for virtual reality; Downloadable cloud-co...
P/S Computer software; metaverse software; utility, security and cryptography software; computer soft...
2022 Invention Apparatus and methods for an application programming interface to detect and locate malware in me...
Invention Logging configuration system and method. Systems and methods for monitoring network activity. Th...
Invention Malicious application detection. Systems and methods for methods network activity. The methods i...
Invention Security against physical keystroke simulation. A computer-implemented method includes detecting...
Invention Signature reporting system and method. Systems and methods for monitoring network activity. The ...
Invention Misconfigured mirror port detection. A method includes monitoring a plurality of packets received...
Invention Managing and classifying computer processes. In a system and method for processing computer syste...
Invention Variable timeouts between operating modes of a computer for detecting malicious software. A meth...
Invention Scanning for malware based on process identification. Systems and methods to scan for malware on...
P/S (Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones...
P/S (Based on 44(d) Priority Application) Downloadable computer software for controlling and managing...
P/S Downloadable computer software, downloadable computer programs, and downloadable mobile applicati...
P/S Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB computer security ke...
P/S Communication by computer terminals; Information transmission via electronic communications netwo...
P/S Computer hardware; wireless access points; computer software, computer programs, and downloadabl...
P/S Computer hardware; wireless access points; computer software, computer programs, and downloadable...
P/S Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s...
P/S Computer hardware, namely, for data networking; Downloadable computer software for managing, conf...
P/S Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a...
P/S Computer programming services for the protection of software; data security services; computer so...
P/S Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat...
P/S Computer hardware; computer software; wireless access points; computer software, computer program...
P/S Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware...
P/S (Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documen...
P/S Downloadable security software to provide cybersecurity protection; computer hardware; wireless a...
2021 P/S (Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf...
P/S (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ...
P/S Computer security consultancy; Computer virus protection services; Cloud computing featuring soft...
P/S Computer diagnostic services; Computer security consultancy; Computer security consultancy in the...
P/S Computer hardware; wireless access points devices namely, wireless routers; computer software, co...
P/S Computer hardware; wireless access points devices; computer software, computer programs, and dow...
P/S Technical advice relating to operation of computers; technical support services, namely troublesh...