2023
|
G/S
|
(Based on Use in Commerce) Authentication of data in the field of e-commerce and digital payments... |
|
G/S
|
Integrated cloud security platform that unifies security across workloads, environments, and enti... |
|
G/S
|
(Based on Intent to Use) 3D spectacles; Downloadable augmented reality software for virtual reali... |
|
Invention
|
Malware mitigation based on runtime memory allocation.
A compute instance is instrumented to det... |
|
G/S
|
Computer software; metaverse software; utility, security and cryptography software; computer soft... |
2022
|
Invention
|
Tracking malicious software movement with an event graph.
A multi-endpoint event graph causally ... |
|
Invention
|
Access point registration in a network.
Implementations generally relate methods, systems, and c... |
|
Invention
|
Gateway deployment for a zero trust environment.
A virtualized gateway for applications in a zer... |
|
Invention
|
Cloud management of connectivity for edge networking devices.
Certain edge networking devices su... |
|
Invention
|
Realtime event detection.
An event handler implements a state machine or similar construct for p... |
|
G/S
|
(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones... |
|
Invention
|
Point-controlled rogue ap avoidance + rogue ap detection using synchronized security.
Methods, s... |
|
G/S
|
(Based on 44(d) Priority Application) Downloadable computer software for controlling and managing... |
|
Invention
|
Streaming and filtering event objects into a data lake.
An asynchronous stream of security event... |
|
Invention
|
Composite threat score.
A platform for threat investigation in an enterprise network receives th... |
|
Invention
|
Incremental enrichment of threat data.
A threat management facility receives data from a variety... |
|
Invention
|
Platform for managing threat data.
A platform for managing threat data integrates threat data fr... |
|
Invention
|
Augmented threat detection using an attack matrix and data lake queries.
A threat management sys... |
|
Invention
|
Security integration for cloud services.
A threat management facility for an enterprise network ... |
|
Invention
|
Automatically generated investigation container.
A threat management facility calculates a compo... |
|
Invention
|
Augmented threat investigation. A platform for network threat investigation is augmented with dat... |
|
G/S
|
Downloadable computer software, downloadable computer programs, and downloadable mobile applicati... |
|
G/S
|
(Based on Intent to Use) Battery chargers for mobile phones; Cases for mobile phones; Computer ha... |
|
G/S
|
Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware... |
|
G/S
|
Computer hardware; wireless access points; computer
software, computer programs, and downloadabl... |
|
G/S
|
Computer hardware; wireless access points; computer software, computer programs, and downloadable... |
|
Invention
|
Using reputation to avoid false malware detections.
A variety of techniques are disclosed for de... |
|
Invention
|
Managing admission of unrecognized devices onto an enterprise network.
A threat management facil... |
|
G/S
|
Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s... |
|
G/S
|
Computer hardware, namely, for data networking; Downloadable computer software for managing, conf... |
|
G/S
|
Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a... |
|
Invention
|
System and method for providing a secure vlan within a wireless network.
Methods, systems and co... |
|
Invention
|
Dynamically updated user interface for threat investigation.
A technique for dynamically updatin... |
|
Invention
|
Endpoint with remotely programmable data recorder.
An endpoint coupled in a communicating relati... |
|
Invention
|
Cloud storage scanner.
A system, method and computer program for a scanning service is presented... |
|
Invention
|
Methods and apparatus for using machine learning to classify malicious infrastructure. Embodiment... |
|
G/S
|
Computer programming services for the protection of software; data security services; computer so... |
|
G/S
|
Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat... |
|
G/S
|
Computer hardware; computer software; wireless access points; computer software, computer program... |
|
Invention
|
Updating a cluster of nodes in a network appliance.
An administrator can initiate an automatic s... |
|
Invention
|
Distributed zero trust network access.
In order to use zero trust network resources distributed ... |
|
Invention
|
Software rollback of cluster of network devices.
In a cluster of network devices using a consens... |
|
Invention
|
Extending expiration of user sessions with authentication refresh.
A gateway performs silent aut... |
|
Invention
|
Executable policy declarations for network security.
A policy created through an administrative ... |
|
Invention
|
Network configuration update.
A cluster of nodes are sequentially updated with new network confi... |
|
Invention
|
Tracking malware root causes with an event graph.
An event graph associated with a root cause fo... |
|
Invention
|
Tracking malware root causes with an event graph.
An event graph can be generated, and, upon mal... |
|
Invention
|
Securing endpoints in a heterogenous enterprise network.
Endpoints and a corresponding switch wi... |
|
Invention
|
Intrusion detection using a heartbeat. A variety of techniques are disclosed for detection of adv... |
|
Invention
|
Network appliances for secure enterprise resources. Various modifications to a distributed platfo... |
|
Invention
|
Encrypted cache protection. Secrets such as secure session cookies for a web browser can be prote... |
|
Invention
|
Incremental updates to malware detection models.
A machine learning model is sequentially fine-t... |
|
Invention
|
Application firewall.
A firewall uses information about an application that originates a network... |
|
G/S
|
(Based on Use in Commerce) Downloadable electronic publications in the nature of manuals, technic... |
|
G/S
|
Downloadable security software to provide cybersecurity protection; computer hardware; wireless a... |
2021
|
G/S
|
(Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf... |
|
Invention
|
Threat management using network traffic to determine security states.
Various aspects related to... |
|
Invention
|
Interprocessor procedure calls.
A firewall host uses a shared memory to pass arguments to, and r... |
|
Invention
|
Firewall offloading.
A firewall system provides two network paths for network flows: one path th... |
|
Invention
|
Classifier generator. A rule generator can automatically generate a machine-leaming-powered detec... |
|
Invention
|
Combined security and qos coordination among devices.
A method includes establishing a wireless ... |
|
Invention
|
Automatic fuzz testing framework.
Various aspects related to methods, systems, and computer read... |
|
G/S
|
(Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ... |
|
G/S
|
Computer security consultancy; Computer virus protection services; Cloud computing featuring soft... |
|
Invention
|
Encrypted cache protection.
Secrets such as secure session cookies for a web browser can be prot... |
|
G/S
|
Computer diagnostic services; Computer security consultancy; Computer security consultancy in the... |
|
Invention
|
Mitigating threats associated with tampering attempts.
An enterprise security system is improved... |
|
Invention
|
Methods and apparatus for using machine learning to classify malicious infrastructure.
Embodimen... |
|
G/S
|
Computer hardware; wireless access points devices; computer software, computer programs, and down... |
|
G/S
|
Computer hardware; wireless access points devices; computer
software, computer programs, and dow... |
|
G/S
|
Outsource service providers in the field of information technology; technical advice relating to ... |
|
G/S
|
Outsource service providers in the field of information
technology; technical advice relating to... |
|
G/S
|
Computer programming services for the protection of
software; data security services; computer s... |
|
Invention
|
System and method for providing and managing security rules and policies.
Methods, systems, and ... |
|
G/S
|
Downloadable electronic publications, articles and documents in the field of data security and se... |
|
G/S
|
Computer software, computer programs, and downloadable mobile applications for use in managing, m... |
|
Invention
|
Cloud management of connectivity for edge networking devices. Certain edge networking devices suc... |
|
Invention
|
Gateway management for a zero trust environment. A virtualized gateway for applications in a zero... |
2019
|
Invention
|
Malware mitigation based on runtime memory allocation. A compute instance is instrumented to dete... |