|
2024
|
Invention
|
Apparatus for secure network communications.
An embodiment of the present invention describes me... |
|
|
Invention
|
Systems and methods for preserving system contextual information in an encapsulated packet.
In s... |
|
|
Invention
|
Software defined wide area network management within application programming interface rate limit... |
|
2023
|
Invention
|
Unified topology across domains. A device to detect a first piece of equipment of a plurality of ... |
|
|
Invention
|
System and method for canvas sanitization.
Novel systems and methods for canvas sanitization are... |
|
|
Invention
|
Providing encrypted end-to-end email delivery between secure email clusters.
The systems and met... |
|
|
P/S
|
Software; Server software; Downloadable software. |
|
|
Invention
|
Network security device. Operations of a security device are provided herein. The operations may ... |
|
|
Invention
|
Monitoring network volatility. Novel solutions for monitoring and analyzing networks in terms of ... |
|
|
P/S
|
Computer software, namely, downloadable computer utility program for analyzing function and perfo... |
|
|
Invention
|
Systems of and methods for managing tenant and user identity information in a multi-tenant enviro... |
|
2022
|
Invention
|
Virtual network interface management for network functions using network definitions. Network rul... |
|
|
Invention
|
Intercept for encrypted communications.
Aspects of the disclosure include replacing, by a DNS pr... |
|
|
P/S
|
Downloadable computer programs for project management, digital product management, work collabora... |
|
|
P/S
|
Software as a service (SAAS) services featuring software for project management, digital product ... |
|
|
P/S
|
Downloadable computer programs for project management, product management, work collaboration, in... |
|
|
P/S
|
Software as a service (SAAS) services featuring software for project management, product manageme... |
|
|
Invention
|
Secure access to a corporate web application with translation between an internal address and an ... |
|
|
Invention
|
Amplification of initial training data. Techniques are disclosed relating to increasing the amoun... |
|
2021
|
Invention
|
Systems and methods for preserving system contextual information in an encapsulated packet. In so... |
|
2020
|
P/S
|
Software as a Service (SAAS) services featuring cloud software security services, namely, monitor... |
|
2019
|
Invention
|
Secure access to a corporate application in an ssh session using a transparent ssh proxy. Secure ... |
|
|
Invention
|
Secure access to a corporate application using a facade. Secure access to a corporate application... |
|
|
Invention
|
Systems and methods for managing a need-to-know domain name system. The disclosed computer-implem... |
|
|
Invention
|
Systems and methods for protecting a cloud computing device from malware. The disclosed computer-... |
|
|
Invention
|
Systems and methods for safely executing unreliable malware. The disclosed computer-implemented m... |
|
|
P/S
|
Educational services, namely, conducting computer security training and classes in the field of s... |
|
|
Invention
|
Isolating an iframe of a webpage. Isolating an iframe of a webpage. In one embodiment, a method m... |
|
|
Invention
|
Identifying and protecting against an attack against an anomaly detector machine learning classif... |
|
|
Invention
|
Adjudicating files by classifying directories based on collected telemetry data. Telemetry data f... |
|
|
Invention
|
Systems and methods for protecting against malicious content. The disclosed computer-implemented ... |
|
|
Invention
|
Identifying and mitigating harm from malicious network connections by a container. Identifying an... |
|
|
Invention
|
Pre-filtering detection of an injected script on a webpage accessed by a computing device. Pre-fi... |
|
|
Invention
|
Systems and methods for utilizing metadata for protecting against the sharing of images in a comp... |
|
|
Invention
|
Systems and methods for preparing a secure search index for securely detecting personally identif... |
|
|
Invention
|
Systems and methods for managing endpoint security states using passive data integrity attestatio... |
|
|
Invention
|
Systems and methods for malware detection using localized machine learning. The disclosed compute... |
|
|
Invention
|
Application behavioral fingerprints. Methods, systems, and devices for protecting against abnorma... |
|
|
Invention
|
Machine learning adversarial campaign mitigation on a computing device. Machine learning adversar... |
|
|
Invention
|
Knowledge-aware detection of attacks on a client device conducted with dual-use tools. Knowledge-... |
|
|
Invention
|
Systems and methods for detecting code implanted into a published application. The disclosed comp... |
|
|
Invention
|
Systems and methods for detecting and protecting against malicious use of legitimate computing-sy... |
|
|
Invention
|
Threat isolation for documents using distributed storage mechanisms. A cloud device is configured... |
|
|
Invention
|
Abnormal user behavior detection. A method for detecting and protecting against abnormal user beh... |
|
|
Invention
|
Automatically generating malware definitions using word-level analysis. Methods and systems are p... |
|
|
Invention
|
Systems and methods for protection of storage systems using decoy data. The disclosed computer-im... |
|
|
Invention
|
Universal tracing of side-channel processes in computing environments. A method for identifying s... |
|
|
Invention
|
Discovery of computer system incidents to be remediated based on correlation between support inte... |
|
|
Invention
|
Securing cloud applications via isolation. A method for securing cloud applications is described.... |
|
2018
|
Invention
|
Systems and methods for producing adjustments to malware-detecting services. The disclosed comput... |
|
|
Invention
|
Systems and methods for preserving system contextual information in an encapsulated packet. The d... |
|
|
Invention
|
Detecting and protecting against computing breaches based on lateral movement of a computer file ... |
|
|
Invention
|
Systems and methods for detecting covert channels structured in internet protocol transactions. T... |
|
|
Invention
|
Systems and methods for executing decision trees. The disclosed computer-implemented method for e... |
|
|
P/S
|
design, development, and consulting services related thereto in the field of computer software an... |
|
|
Invention
|
Systems and methods for preventing data loss from data containers. The disclosed computer-impleme... |
|
|
Invention
|
Systems and methods for tuning application network behavior. The disclosed computer-implemented m... |
|
|
Invention
|
Systems and methods for dynamically augmenting machine learning models based on contextual factor... |
|
2017
|
P/S
|
Providing an Internet website portal in the field of sales
and marketing, and sales and marketin... |
|
2016
|
P/S
|
Computer software; computer hardware; data processing equipment; security software; computer soft... |
|
|
P/S
|
Business management and consulting services for the data security and information technology indu... |
|
|
P/S
|
Educational services; education services, namely, providing training, assessment, and simulated t... |
|
|
P/S
|
Educational services; education services, namely, providing on-line and simulation training in th... |
|
2015
|
P/S
|
Business management services, namely, providing outsource management services to others in the fi... |
|
|
P/S
|
Electronic storage of data; electronic document and email archiving services; technical support s... |
|
|
P/S
|
Computer software for use in detection of malware by executing content, analyzing file behavior a... |
|
2014
|
P/S
|
Computer security consultancy; computer software consulting;
computer software development; comp... |
|
|
P/S
|
Computer software; computer hardware; Internet security software; enterprise security software th... |
|
|
P/S
|
Internet security software; enterprise security software that provides security monitoring and ma... |
|
|
P/S
|
Computer software; Computer software platforms for providing users with security alerts, security... |
|
2013
|
P/S
|
Computer software; computer hardware; computer software that acts as a gateway between different ... |
|
2012
|
P/S
|
Cloud security software for the encryption and protection of data. Cloud computing provider servi... |
|
|
P/S
|
Computer software and hardware for creating, deploying, accelerating, executing and providing sec... |
|
|
P/S
|
Computer hardware and computer software; computer software for the management of software develop... |
|
|
P/S
|
Computer security service, namely, providing online non-downloadable software for scanning and sc... |
|
2011
|
P/S
|
Network performance diagnostics and analysis software Consulting services in the field of compute... |
|
|
P/S
|
Computer software for providing network, Internet, and computer security; computer software for p... |
|
2010
|
P/S
|
Computer software for providing cryptographic network security and data security functions; compu... |
|
|
P/S
|
Computer software, namely enterprise management software, information management software, applic... |
|
|
P/S
|
Computer software. Computer consulting services; computer security services, namely, restricting ... |
|
|
P/S
|
computer software, namely, enterprise management software for distributing software among compute... |
|
|
P/S
|
Computer hardware and software that minimizes bandwidth consumption, decreases latency, and facil... |
|
2009
|
P/S
|
Computer software the functions of which is to facilitate the collection, storage and movement o... |
|
|
P/S
|
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig... |
|
|
P/S
|
Computer software and computer hardware for creating and event-driven and standards-based messagi... |
|
2007
|
P/S
|
Computer software; computer software for use in the backup, storage, imaging and recovery of comp... |
|
|
P/S
|
Computer software for use in the backup, storage, imaging and recovery of computer data, folders,... |
|
|
P/S
|
Computer hardware, computer peripherals and computer
software for computer, network and Internet... |
|
|
P/S
|
Computer software for providing an on-line database in the field of transaction processing to upl... |
|
2006
|
P/S
|
Computer Software Programs, Namely, Programs that Allow Programs Operating on Different and Disti... |
|
|
P/S
|
Network performance, diagnostics and analysis software for networks supporting data, VoIP and vid... |
|
2005
|
P/S
|
Scientific, nautical, surveying, photographic, cinematographic, signalling, checking (supervision... |
|
|
P/S
|
Computer software; scientific, nautical, surveying, photographic, cinematographic, signalling, ch... |