Palo Alto Networks, Inc.

United States of America


 
Total IP 903
Total IP incl. subs 904 (+ 1 for subs)
Total IP Rank # 1,437
IP Activity Score 3.6/5.0    802
IP Activity Rank # 905
Stock Symbol
ISIN US6974351057
Market Cap. 100,099M  (USD)
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

778 26
5 15
60 11
8
 
Last Patent 2024 - Securely publishing applications...
First Patent 1994 - Remote smart filtering communica...
Last Trademark 2023 - PRECISION AI
First Trademark 2007 - PAN-OS

Subsidiaries

1 subsidiaries with IP (1 patents, 0 trademarks)

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2024 Invention Heuristic database querying with dynamic partitioning. Dynamic partitioning of a search space of...
Invention Mobile user identity and/or sim-based iot identity and application identity based security enforc...
2023 Invention Joining javascript object notation (json) queries across cloud resources. A cloud resource join ...
Invention Context informed abnormal endpoint behavior detection. Adaptive normal profiles are generated at...
Invention Malicious js detection based on automated user interaction emulation. Detection of malicious Jav...
Invention Detecting behavioral change of iot devices using novelty detection based behavior traffic modelin...
Invention Iot device application workload capture. Internet of Things (IoT) device application workload ca...
Invention Detecting patient-zero exfiltration attacks on websites using taint tracking. An execution envir...
Invention Strategically aged domain detection. Detection of strategically aged domains is detected. A list ...
Invention Centralized identity redistribution. Techniques for providing centralized identity redistribution...
Invention Context profiling for malware detection. Analysis of samples for maliciousness is disclosed. A s...
G/S Software as a service (SAAS) services featuring software using artificial intelligence for the mo...
Invention Innocent until proven guilty (iupg): adversary resistant and false positive resistant deep learni...
Invention Inline package name based supply chain attack detection and prevention. Inline package name base...
Invention Identification of malicious domain campaigns using unsupervised clustering. The technology prese...
Invention Packet classification for network routing. Techniques for packet classification for network rout...
Invention Security appliance to monitor networked computing environment. A security appliance samples data...
Invention Automated extraction and classification of malicious indicators. Techniques for generating actio...
G/S Cloud-native application protection platform for an early threat detection and prevention system ...
Invention Inline package name based supply chain attack detection and prevention. Inline package name based...
Invention Intent-based query and response routing between users and backend services. For a seamless and ro...
Invention Cobalt strike beacon http c2 heuristic detection. Techniques for Cobalt Strike Beacon HTTP C2 he...
Invention Securely publishing applications from private networks. A controller can securely publish an app...
Invention Consistent monitoring and analytics for security insights for network and security functions for ...
Invention Applying subscriber-id based security, equipment-id based security, and/or network slice-id based...
Invention Selective intelligent enforcement in mobile networks. Techniques for selective intelligent enforc...
Invention Cobalt strike beacon http c2 heuristic detection. Techniques for Cobalt Strike Beacon HTTP C2 heu...
Invention Sample traffic based self-learning malware detection. Techniques for sample traffic based self-l...
Invention Attack chain identification via misconfigurations in cloud resources. A cloud resource management...
Invention Dynamic management of packet loss. Exemplary methods, apparatuses, and systems include duplicati...
2022 Invention Dependency emulation for executable samples. Techniques for dependency emulation for executable ...
Invention Strategically aged domain detection. Detection of strategically aged domains is detected. A list...
G/S Providing information, analytics and statistics about commodities for use in the field of financ...
G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and...
G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte...
G/S Providing on-line non-downloadable software for data mining, connecting with internet protocol ad...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patt...
Invention Providing identity protection. Techniques for providing identity protection are disclosed. A sys...
Invention Contrastive credibility propagation for semi-supervised learning. A contrastive credibility prop...
Invention Combined structure and import behavior signatures based malware learning and detection. A system...
G/S Promoting best practices and providing consumer information related to cybersecurity threat intel...
G/S Promoting best practices and consumer information related to cybersecurity threat intelligence a...
Invention Suspension and disabling of faulting devices powered through power over ethernet. Power sourcing...
Invention Inline malicious url detection with hierarchical structure patterns. A hierarchical structure co...
Invention Deploying ipv6 routing. Techniques for deploying IPv6 routing are disclosed. A system, process, ...
Invention Application precedence based traffic policy enforcement. Assigning priority values to application...
Invention Optical character recognition filtering. An OCR filter described herein filters non-textual file...
Invention Supporting overlapping network addresses universally. Techniques for supporting overlapping netw...
Invention Detecting shadowed domains. A method and system for detecting shadowed domains is provided. New ...
Invention Text classification of api documentation for informing security policy creation. An API response...
Invention Method to classify compliance protocols for saas apps based on web page content. The present app...
Invention Probing for cobalt strike teamserver detection. Techniques for probing for Cobalt Strike TeamSer...
Invention Beacon and threat intelligence based apt detection. Techniques for beacon and threat intelligenc...
Invention Unified parked domain detection system. The present application discloses a method, system, and ...
Invention Cobalt strike beacon https c2 heuristic detection. Techniques for Cobalt Strike Beacon HTTPS C2 ...
Invention Heuristic database querying with dynamic partitioning. Dynamic partitioning of a search space of ...
Invention Attack chain identification via misconfigurations in cloud resources. A cloud resource managemen...
Invention Data slicing for internet asset attribution. An asset attribution model attributes assets to org...
G/S Providing temporary use of non-downloadable software for autonomous threat detection, collection,...
2021 G/S Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth...
G/S Monitoring of computer systems for security purposes.
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network route...
G/S Consumer network security devices, namely, firewalls, routers, wifi hotspots, and mesh networks ...
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network rout...
G/S Providing nondownloadable instructional materials and guidelines in the field of computer softwar...
G/S Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ...
2020 G/S Computer hardware, namely, firewalls and network security devices; downloadable computer security...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer softwar...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer software...
G/S Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t...
G/S Downloadable computer software for monitoring, managing and securing computer systems and network...
2019 G/S Computer hardware, namely, firewalls and networks security devices; computer software for compute...
G/S Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits...
G/S Providing a database featuring information, analytics and statistics about commodities for use i...
G/S downloadable computer software for computer network security technical support services, namely, ...
G/S Technological consultation in the field of computer networking and network security, excluding te...
2018 G/S Providing temporary use of non-downloadable computer software for browsing and accessing computer...
2017 G/S Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malw...
G/S Publication of on-line journals, namely, blogs featuring information related to computer system a...
G/S On-line journals, namely, blogs featuring information in the field of computer system and cloud s...
2015 G/S Software as a service (SAAS) services featuring software for data security and system security in...