Sophos Limited

United Kingdom


 
Total IP 485
Total IP incl. subs 487 (+ 2 for subs)
Total IP Rank # 2,535
IP Activity Score 3.3/5.0    404
IP Activity Rank # 1,746
Parent Entity Sophos Holdings Limited
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

304 73
4 8
39 11
46
 
Last Patent 2023 - Malware mitigation based on runt...
First Patent 1994 - Validity checking
Last Trademark 2023 - SOPHOS CLOUD NATIVE SECURITY
First Trademark 1994 - SOPHOS

Subsidiaries

1 subsidiaries with IP (0 patents, 2 trademarks)

1 subsidiaries without IP

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2023 G/S (Based on Use in Commerce) Authentication of data in the field of e-commerce and digital payments...
G/S Integrated cloud security platform that unifies security across workloads, environments, and enti...
G/S (Based on Intent to Use) 3D spectacles; Downloadable augmented reality software for virtual reali...
Invention Malware mitigation based on runtime memory allocation. A compute instance is instrumented to det...
G/S Computer software; metaverse software; utility, security and cryptography software; computer soft...
2022 Invention Tracking malicious software movement with an event graph. A multi-endpoint event graph causally ...
Invention Access point registration in a network. Implementations generally relate methods, systems, and c...
Invention Gateway deployment for a zero trust environment. A virtualized gateway for applications in a zer...
Invention Cloud management of connectivity for edge networking devices. Certain edge networking devices su...
Invention Realtime event detection. An event handler implements a state machine or similar construct for p...
G/S (Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones...
Invention Point-controlled rogue ap avoidance + rogue ap detection using synchronized security. Methods, s...
G/S (Based on 44(d) Priority Application) Downloadable computer software for controlling and managing...
Invention Streaming and filtering event objects into a data lake. An asynchronous stream of security event...
Invention Composite threat score. A platform for threat investigation in an enterprise network receives th...
Invention Incremental enrichment of threat data. A threat management facility receives data from a variety...
Invention Platform for managing threat data. A platform for managing threat data integrates threat data fr...
Invention Augmented threat detection using an attack matrix and data lake queries. A threat management sys...
Invention Security integration for cloud services. A threat management facility for an enterprise network ...
Invention Automatically generated investigation container. A threat management facility calculates a compo...
Invention Augmented threat investigation. A platform for network threat investigation is augmented with dat...
G/S Downloadable computer software, downloadable computer programs, and downloadable mobile applicati...
G/S (Based on Intent to Use) Battery chargers for mobile phones; Cases for mobile phones; Computer ha...
G/S Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware...
G/S Computer hardware; wireless access points; computer software, computer programs, and downloadabl...
G/S Computer hardware; wireless access points; computer software, computer programs, and downloadable...
Invention Using reputation to avoid false malware detections. A variety of techniques are disclosed for de...
Invention Managing admission of unrecognized devices onto an enterprise network. A threat management facil...
G/S Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s...
G/S Computer hardware, namely, for data networking; Downloadable computer software for managing, conf...
G/S Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a...
Invention System and method for providing a secure vlan within a wireless network. Methods, systems and co...
Invention Dynamically updated user interface for threat investigation. A technique for dynamically updatin...
Invention Endpoint with remotely programmable data recorder. An endpoint coupled in a communicating relati...
Invention Cloud storage scanner. A system, method and computer program for a scanning service is presented...
Invention Methods and apparatus for using machine learning to classify malicious infrastructure. Embodiment...
G/S Computer programming services for the protection of software; data security services; computer so...
G/S Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat...
G/S Computer hardware; computer software; wireless access points; computer software, computer program...
Invention Updating a cluster of nodes in a network appliance. An administrator can initiate an automatic s...
Invention Distributed zero trust network access. In order to use zero trust network resources distributed ...
Invention Software rollback of cluster of network devices. In a cluster of network devices using a consens...
Invention Extending expiration of user sessions with authentication refresh. A gateway performs silent aut...
Invention Executable policy declarations for network security. A policy created through an administrative ...
Invention Network configuration update. A cluster of nodes are sequentially updated with new network confi...
Invention Tracking malware root causes with an event graph. An event graph associated with a root cause fo...
Invention Tracking malware root causes with an event graph. An event graph can be generated, and, upon mal...
Invention Securing endpoints in a heterogenous enterprise network. Endpoints and a corresponding switch wi...
Invention Intrusion detection using a heartbeat. A variety of techniques are disclosed for detection of adv...
Invention Network appliances for secure enterprise resources. Various modifications to a distributed platfo...
Invention Encrypted cache protection. Secrets such as secure session cookies for a web browser can be prote...
Invention Incremental updates to malware detection models. A machine learning model is sequentially fine-t...
Invention Application firewall. A firewall uses information about an application that originates a network...
G/S (Based on Use in Commerce) Downloadable electronic publications in the nature of manuals, technic...
G/S Downloadable security software to provide cybersecurity protection; computer hardware; wireless a...
2021 G/S (Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf...
Invention Threat management using network traffic to determine security states. Various aspects related to...
Invention Interprocessor procedure calls. A firewall host uses a shared memory to pass arguments to, and r...
Invention Firewall offloading. A firewall system provides two network paths for network flows: one path th...
Invention Classifier generator. A rule generator can automatically generate a machine-leaming-powered detec...
Invention Combined security and qos coordination among devices. A method includes establishing a wireless ...
Invention Automatic fuzz testing framework. Various aspects related to methods, systems, and computer read...
G/S (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ...
G/S Computer security consultancy; Computer virus protection services; Cloud computing featuring soft...
Invention Encrypted cache protection. Secrets such as secure session cookies for a web browser can be prot...
G/S Computer diagnostic services; Computer security consultancy; Computer security consultancy in the...
Invention Mitigating threats associated with tampering attempts. An enterprise security system is improved...
Invention Methods and apparatus for using machine learning to classify malicious infrastructure. Embodimen...
G/S Computer hardware; wireless access points devices; computer software, computer programs, and down...
G/S Computer hardware; wireless access points devices; computer software, computer programs, and dow...
G/S Outsource service providers in the field of information technology; technical advice relating to ...
G/S Outsource service providers in the field of information technology; technical advice relating to...
G/S Computer programming services for the protection of software; data security services; computer s...
Invention System and method for providing and managing security rules and policies. Methods, systems, and ...
G/S Downloadable electronic publications, articles and documents in the field of data security and se...
G/S Computer software, computer programs, and downloadable mobile applications for use in managing, m...
Invention Cloud management of connectivity for edge networking devices. Certain edge networking devices suc...
Invention Gateway management for a zero trust environment. A virtualized gateway for applications in a zero...
2019 Invention Malware mitigation based on runtime memory allocation. A compute instance is instrumented to dete...