2023
|
Invention
|
Network slice-based security in mobile networks.
Techniques for providing network slice-based se... |
2022
|
Invention
|
Dynamically scalable application firewall deployment for cloud native applications.
A configurat... |
|
Invention
|
Dynamic establishment and termination of vpn tunnels between spokes.
To reduce overhead generate... |
|
Invention
|
Localization at scale for a cloud-based security service.
Techniques for providing localization ... |
|
Invention
|
Access point name and application identity based security enforcement in service provider network... |
|
Invention
|
Key-value storage for url categorization.
A URL and a categorization associated with the URL are... |
|
G/S
|
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and... |
|
G/S
|
Providing information, analytics and statistics about
commodities for use in the field of financ... |
|
G/S
|
Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ... |
|
G/S
|
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte... |
|
G/S
|
Providing information, analytics and statistics about commodities for use in the field of finance... |
|
G/S
|
Downloadable software and applications for detecting,
collecting, monitoring, and analyzing patt... |
|
Invention
|
Dynamic analysis techniques for applications.
A sample is analyzed to determine a set of events ... |
|
Invention
|
Iot device identification with packet flow behavior machine learning model.
Identifying Internet... |
|
Invention
|
Preventing ransomware from encrypting files on a target machine.
Techniques for preventing ranso... |
|
Invention
|
Private cloud control.
Management of IoT devices through a private cloud. An IoT device is coupl... |
|
Invention
|
Multi-representational learning models for static analysis of source code.
Techniques for multi-... |
|
Invention
|
Security platform for service provider network environments.
Techniques for providing a securing... |
|
Invention
|
Label guided unsupervised learning based network-level application signature generation.
Applica... |
|
G/S
|
Promoting best practices and consumer information related to cybersecurity threat intelligence an... |
|
G/S
|
Promoting best practices and consumer information related to
cybersecurity threat intelligence a... |
|
Invention
|
Iot device identification with packet flow behavior machine learning model. Identifying Internet ... |
|
Invention
|
Distributed cardinality optimization.
A cardinality query associated with a specific attribute i... |
|
Invention
|
Encoding-free javascript stringify for clientless vpn.
A client device requests a web page via a... |
|
Invention
|
Inline identify and block dangling dns records. The present application discloses a method, syste... |
|
Invention
|
Predictive dns cache to improve security and performance. The present application discloses a met... |
|
Invention
|
Dynamic path selection and data flow forwarding.
Various techniques for dynamic path selection a... |
|
Invention
|
Iot security policy on a firewall. Techniques for enforcing policies on Internet of Things (loT) ... |
|
Invention
|
Multi-model based target engagement sequence generator.
To identify a target engagement sequence... |
|
Invention
|
Securing containerized applications.
Techniques for securing containerized applications are disc... |
|
Invention
|
Mobile user identity and/or sim-based iot identity and application identity based security enforc... |
|
Invention
|
Remote attack surface discovery and management.
Techniques for identifying and managing an organ... |
|
Invention
|
Network path health scoring based on load binned latency data.
A network path scoring system is ... |
|
Invention
|
Packet loss based real-time network path health scoring.
The disclosed scoring uses a “dynamic p... |
|
Invention
|
Latency based network path scoring.
A network path scoring system is disclosed herein that score... |
|
Invention
|
Capacity agnostic scoring of network path health based on packet loss.
A network path scoring sy... |
|
G/S
|
Providing temporary use of non-downloadable software for autonomous threat detection, collection,... |
|
G/S
|
Providing a database featuring information, analytics and statistics about commodities for use in... |
|
G/S
|
Promoting best practices and providing consumer information related to cybersecurity threat intel... |
|
Invention
|
Method and system for providing dns security using process information. Domain Name System (DNS) ... |
|
Invention
|
Context-based security over interfaces in o-ran environments in mobile networks. Techniques for a... |
|
Invention
|
Temporal drift detection.
The present application discloses a method, system, and computer syste... |
2021
|
Invention
|
Enhanced cloud infrastructure security through runtime visibility into deployed software.
A syst... |
|
Invention
|
Feedback filtering of time-series metric data. A cloud monitoring system is disclosed herein that... |
|
Invention
|
Malicious js detection based on automated user interaction emulation.
Detection of malicious Jav... |
|
Invention
|
Inline identify and block dangling dns records.
The present application discloses a method, syst... |
|
Invention
|
Predictive dns cache to improve security and performance.
The present application discloses a me... |
|
Invention
|
Managing proxy throughput between paired transport layer connections.
A proxy server can be conf... |
|
G/S
|
Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth... |
|
G/S
|
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ... |
|
G/S
|
Monitoring of computer systems for security purposes. |
|
G/S
|
Computer hardware, namely, firewalls and networks security devices in the nature of network route... |
|
G/S
|
Consumer network security devices, namely, firewalls,
routers, wifi hotspots, and mesh networks ... |
|
G/S
|
Computer hardware, namely, firewalls and networks security
devices in the nature of network rout... |
|
Invention
|
Intelligent deployment region selection and scaling of cloud-based firewalls.
Automated, intelli... |
|
G/S
|
Providing nondownloadable instructional materials and guidelines in the field of computer softwar... |
|
Invention
|
Iot security event correlation.
Correlating Internet of Things (IoT) security events is disclose... |
|
Invention
|
Multi-ssid hidden wireless network.
An access point provides a hidden wireless network that is c... |
|
Invention
|
Token frequency based data matching.
To protect a dataset with low overhead, a cybersecurity app... |
|
Invention
|
Supporting zone-based policy enforcement for a firewall connected to a one-arm load balancer.
A ... |
|
Invention
|
Causality detection for outlier events in telemetry metric data.
Identifying causal relationship... |
|
Invention
|
Automated fuzzy hash based signature collecting system for malware detection.
Automated fuzzy ha... |
|
Invention
|
Inline detection of encrypted malicious network sessions.
An inline malicious traffic detector c... |
|
Invention
|
Automatic network signature generation.
Automatic generation of network signatures is disclosed.... |
|
Invention
|
Domain squatting detection.
Detection of squatting domains is disclosed. A set of new fully qual... |
|
Invention
|
Graph-based impact analysis of misconfigured or compromised cloud resources.
A graph representat... |
|
Invention
|
Tree-based learning of application programming interface specification.
A cybersecurity applianc... |
2020
|
G/S
|
Providing financial information, analytics and statistics
about commodities from a computer data... |
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer security... |
|
G/S
|
Computer hardware, namely, firewalls and network security
devices; downloadable computer softwar... |
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer software... |
|
G/S
|
Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t... |
|
G/S
|
Downloadable computer software for monitoring, managing and securing computer systems and network... |
2019
|
G/S
|
Computer hardware, namely, firewalls and networks security devices; computer software for compute... |
|
G/S
|
Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits... |
|
G/S
|
Providing a database featuring information, analytics and
statistics about commodities for use i... |
|
G/S
|
downloadable computer software for computer network security technical support services, namely, ... |
|
G/S
|
Technological consultation in the field of computer networking and network security, excluding te... |
2018
|
G/S
|
Providing on-line non-downloadable software for data mining, connecting with internet protocol ad... |
|
G/S
|
Providing temporary use of non-downloadable computer software for browsing and accessing computer... |
2017
|
G/S
|
Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malw... |
|
G/S
|
Publication of on-line journals, namely, blogs featuring information related to computer system a... |
|
G/S
|
On-line journals, namely, blogs featuring information in the field of computer system and cloud s... |
2015
|
G/S
|
Software as a service (SAAS) services featuring software for data security and system security in... |