CrowdStrike, Inc.

États‑Unis d’Amérique


Commandez votre montre hebdomadaire CrowdStrike, Inc.
Quantité totale PI 550
Rang # Quantité totale PI 2 434
Note d'activité PI 3,4/5.0    464
Rang # Activité PI 1 548
Parent CrowdStrike Holdings, Inc.
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

458 37
0 12
14 20
9
 
Dernier brevet 2026 - Cpe prediction using banner-prom...
Premier brevet 2002 - Wireless network security
Dernière marque 2026 - FALCON FLEX
Première marque 2012 - CROWDSTRIKE

Industrie (Classification de Nice)

Derniers inventions, produits et services

2026 P/S Computer security consulting; consulting in the field of information technology; computer securit...
P/S Computer security consulting; consulting in the field of information technology; computer securi...
2025 P/S Computer security consulting; consulting in the field of information technology; Computer securit...
P/S Financial services, namely, providing financing for purchasing cybersecurity software and service...
Invention Securing function as a service cloud computing environments. A system and method of securing a F...
Invention Directory service recommender assessment & scoring. A cybersecurity service assesses, scores, an...
P/S Downloadable computer software for computer and network security. Computer consultation; consult...
P/S Downloadable computer software for computer and network security. Computer consultation; consulti...
Invention Cpe prediction using banner-prompted ai/ml modeling. Prediction of CPEs using banners greatly imp...
Invention Cpe prediction using banner-prompted llm. Prediction of CPEs using banners greatly improves compu...
Invention Context-sensitive token-bucket rate limiting in ebpf. The present disclosure provides techniques ...
2024 Invention Fine-grained access to system commands run via an installed agent application. The present disclo...
Invention Bounding resource consumption in signal with penalty box. The present disclosure provides techni...
Invention Cybersecurity provenance of ml/ai models. A cybersecurity model assessment service assesses mach...
Invention Enriching an event stream with entity state information. Techniques for enriching events with en...
Invention Event detection model. The present disclosure provides techniques for event detection. A process...
Invention Defining indicators of malicious activity by a machine learned model. Techniques for determining...
Invention Cybersecurity detection grouping. A cybersecurity service assesses cybersecurity detections repo...
Invention Machine speed attack defense. The present disclosure provides techniques for machine speed attac...
Invention Multi-modal queries in a digital cybersecurity systems. Multi-modal query processing greatly imp...
Invention Information classification based on detecting provisions for intrusive actions. The present disc...
Invention Cybersecurity breach prediction. Prediction of cybersecurity breaches greatly improves computer ...
Invention Auto-customizing configuration assessment rule values from captured state of a template machine. ...
Invention Irregular interactive command prompt activity detection. Techniques are provided to detect irreg...
Invention Representation-agnostic file classifier. A method of monitoring an endpoint for malicious code i...
Invention Semi-supervised malware classification using representation-agnostic transformer models. A metho...
Invention Estimating cost of query execution on a set of data accessible to a computing system. Estimating ...
Invention Cpe prediction using banner similarity. Prediction of matches between CPEs and banners greatly i...
Invention Prediction of false positive cybersecurity detections. Prediction of false positive cybersecurit...
Invention Large byte model. A cloud-based service assesses sequences of bits/bytes in natural language usi...
Invention Ai model-based data enrichment pipeline. The present disclosure provides an approach of generati...
Invention Repository scanning coordinator. A repository scanning coordinator is disclosed herein. The repo...
Invention Preserving decision value order while training successive artificial intelligence model releases....
Invention Trusted identification verification system. The present disclosure provides techniques for biome...
P/S Computer security consulting; consulting in the field of information technology; consultation in ...
Invention System and method for interpreting superclass behavior in dynamic language computer code. A meth...
Invention Static analysis techniques for dynamic computer programming language. A method includes accessin...
Invention Systems and methods for labeling event data obtained from a computing environment using artificia...
Invention Identifying atypical activity involving an entity in a computer system. Timestamped events involv...
Invention Image analysis using a multimodal large language model. Techniques for automatically determining...
Invention Synchronization protocol in a cloud computing environment. Techniques for exchanging data betwee...
Invention Determining and mitigating artificial intelligence model vulnerabilities. The present disclosure...
Invention Protected training of private adapter models for a hosted foundation model. Methods and systems ...
Invention Cross-cluster search optimization. A preliminary tag search improves computer functioning by redu...
Invention Patch complexity classification. The present disclosure provides an approach of collecting vulne...
Invention Enhanced data pruning strategy for malware detection models. Methods and systems for implementin...
Invention Cybersecurity vulnerability detection with artificial intelligence models. The present disclosur...
Invention Computing fairness. Estimated and actual processor runtimes improve computer functioning in fair...
Invention Cloud-based file integrity monitoring. A cloud-based file integrity monitoring service identifie...
Invention Automated ai model-based pipeline for detection explainability. The present disclosure provides ...
Invention Creating complex honeynet environments with generative artificial intelligence. Systems and meth...
Invention Automatic rule generation for malicious indicators based on historical data. Malicious indicators...
Invention Internet-exposed device discovery. A cloud-based, external attack surface management (or EASM) s...
Invention Machine learned contextual cybersecurity threat prioritization. A cloud-based cybersecurity dete...
Invention Cybersecurity command line assessment. A cloud-based, machine-learned cybersecurity command line...
P/S Software as a service (SaaS) services featuring software for automating customer interactions and...
P/S Software as a service (SaaS) services featuring software for automating customer interactions an...
P/S Software as a service (SAAS) services featuring software for collecting, sorting, searching, sear...
Invention Automatically determining and modifying environments for running microservices in a performant an...
2023 P/S Software for collecting, sorting, searching, processing, encrypting, transmitting, routing, repo...
P/S Computer security consulting; Consulting in the field of information technology relating to insta...
P/S Computer security consulting; consulting services in the field of information technology, namely...
P/S Business administration services; business services, namely, administration of a program for enab...
P/S Business analysis services, namely business profit analysis and business management analysis, bus...
P/S Business administration services; business services, namely, administration of a program for ena...
P/S Business analysis, research and information services; business consulting services in the field ...
P/S Business administration services; Business services, namely, administration of a program for enab...
P/S Downloadable computer software for collecting, sorting, searching, processing, encrypting, transm...
P/S Business analysis, research and information services; business consulting services in the field o...
2022 P/S Computer security consulting; consulting in the field of Internet security and information securi...
P/S Computer security consulting; consulting in the field of information technology; consultation fo...
P/S Cyber security technology services, namely, providing comprehensive application programming inte...
P/S Cyber security technology services, namely, providing comprehensive application programming inter...
Invention Agentless system and method for discovering and inspecting applications and services in compute e...
P/S Downloadable computer software for the protection and security of computer networks and computin...
P/S Educational services, namely, providing online and in-person courses of instruction for detecting...
P/S Computer software for computer and network security. Computer consultation services relating to c...
2021 P/S Computer security consulting; consulting in the field of information technology; consultation for...
P/S Providing online education in the nature of online courses in the fields of cybersecurity, endpoi...
P/S Providing information in the field of monetization of cybersecurity breaches for the protection o...
P/S Downloadable computer software for secure data access, namely, software providing a transparent ...
2020 P/S Providing a website featuring recommendations, ratings and reviews posted by consumers about loca...
P/S Software as a service (SAAS) services featuring software for computer and network security; softw...
P/S educational services, namely, providing online and onsite courses in the fields of cybersecurity,...
P/S computer security consulting; consulting in the field of information technology; consultation in ...