Sophos Limited

United Kingdom


 
Total IP 566
Total IP incl. subs 568 (+ 2 for subs)
Total IP Rank # 2,262
IP Activity Score 3.4/5.0    466
IP Activity Rank # 1,542
Parent Entity Sophos Holdings Limited
Dominant Nice Class Scientific and electric apparatu...

Patents

Trademarks

377 70
3 8
51 11
46
 
Last Patent 2024 - Enterprise document classification
First Patent 1994 - Validity checking
Last Trademark 2023 - XSTREAM
First Trademark 1994 - SOPHOS

Subsidiaries

1 subsidiaries with IP (0 patents, 2 trademarks)

1 subsidiaries without IP

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2023 Invention Methods and apparatus for detection of malicious documents using machine learning. An apparatus ...
Invention Systems and methods for network security. Methods, systems, and computer readable media for netw...
Invention Enterprise document classification. A collection of documents or other files and the like within...
Invention Computer augmented threat evaluation. An automated system attempts to characterize code as safe ...
Invention Cybersecurity configuration in a cloud environment. The present teachings include automatically ...
Invention Endpoint with remotely programmable data recorder. An endpoint coupled in a communicating relati...
Invention Live discovery of enterprise threats based on security query activity. A threat management syste...
Invention Enterprise network threat detection. In a threat management platform, a number of endpoints log ...
G/S Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls
Invention Techniques for detecting living-off-the-land binary attacks. In example embodiments, techniques a...
Invention Rapid development of malicious content detectors. Methods and systems are described for developin...
Invention Use of an application controller to monitor and control software file and application environment...
Invention Sensitive data detection. A data set can be analyzed for the presence of sensitive data using ty...
Invention Rapid development of malicious content detectors. Methods and systems are described for developi...
Invention Using reputation to avoid false malware detections. A variety of techniques are disclosed for de...
Invention Attribute relevance tagging in malware recognition. In general, in one aspect, a method for mach...
Invention Persistent ip address allocation for virtual private network (vpn) clients. Systems and methods f...
Invention Augmented security recognition tasks. A system for conducting a security recognition task, the s...
Invention Implementing a machine-learning model to identify critical systems in an enterprise environment. ...
Invention Techniques for detecting living-off-the-land binary attacks. In example embodiments, techniques ...
Invention Security threat alert analysis and prioritization. A method for prioritizing security events comp...
G/S (Based on Use in Commerce) Authentication of data in the field of e-commerce and digital payments...
Invention Security threat remediation for network-accessible devices. Various aspects related to methods, ...
G/S Providing online non-downloadable digital goods, namely computer software, computer hardware, ele...
Invention Secure firewall configurations. A kernel driver on an endpoint uses a process cache to provide a...
Invention Network access using hardware-based security. An endpoint device uses hardware-based security to...
G/S (Based on Intent to Use) 3D spectacles; Downloadable augmented reality software for virtual reali...
Invention Centralized management of policies for network-accessible devices. Various aspects related to me...
G/S Computer software; metaverse software; utility, security and cryptography software; computer soft...
2022 Invention Hybrid appliance for zero trust network access to customer applications. A zero trust network ac...
Invention Dynamic routing of application traffic to ztna connectors. A cloud computing platform provides z...
Invention Cloud-based zero trust network access service. Infrastructure for zero trust network access (ZTN...
Invention Validation of ztna configuration for a multi-tenant proxy environment. A cloud-based platform fo...
Invention Domain ownership verification for a ztna service platform. A cloud computing platform provides z...
Invention Alias domains for accessing ztna applications. A cloud computing platform provides zero trust ne...
Invention Scaling tunnels for zero trust network access appliances. A cloud computing platform provides ze...
Invention Cloud-based zero trust network access services. Various modifications to a zero trust network acc...
Invention Systems and methods for implementing policy changes in multi-tenant environments. In one or more ...
Invention Logging configuration system and method. Systems and methods for monitoring network activity. Th...
Invention Signature reporting system and method. Systems and methods for monitoring network activity. The ...
Invention Variable timeouts between operating modes of a computer for detecting malicious software. A meth...
Invention Scanning for malware based on process identification. Systems and methods to scan for malware on...
Invention Pausing automatic software updates of virtual machines. Adapting automatic software update behav...
Invention Secure hashing of large data files to verify file identity. Secure hashing of large files to ver...
Invention Method and system for outbound spam mitigation. A method for mitigating outbound electronic messa...
Invention Security threat alert analysis and prioritization. A method for prioritizing security events com...
G/S (Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones...
Invention Evaluating network flow risks. A cluster of network flows is formed on the basis of a particular...
Invention Catalog for managing modular code. A catalog of pipelines for modular coding integrates resource...
Invention Security compliance for modular code. A catalog of pipelines for modular coding integrates resou...
Invention Persistent ip address allocation for virtual private network (vpn) clients. Systems and methods ...
Invention Digital certificate malicious activity detection. Systems and methods for detecting malicious ac...
Invention Traffic scanning with context-aware threat signatures. Threat management devices and methods. Th...
G/S (Based on 44(d) Priority Application) Downloadable computer software for controlling and managing...
G/S Downloadable computer software, downloadable computer programs, and downloadable mobile applicati...
Invention Deduplication of endpoint images. A threat management facility for an enterprise provides securi...
Invention Methods and apparatus for machine learning to generate a decision tree database to identify comma...
G/S (Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB com...
G/S Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware...
G/S Computer hardware; wireless access points; computer software, computer programs, and downloadabl...
G/S Computer hardware; wireless access points; computer software, computer programs, and downloadable...
G/S Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s...
G/S Computer hardware, namely, for data networking; Downloadable computer software for managing, conf...
G/S Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a...
G/S Computer programming services for the protection of software; data security services; computer so...
G/S Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat...
G/S Computer hardware; computer software; wireless access points; computer software, computer program...
G/S (Based on 44(e)) Downloadable electronic publications in the nature of manuals, technical documen...
G/S Downloadable security software to provide cybersecurity protection; computer hardware; wireless a...
2021 G/S (Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf...
G/S (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ...
G/S Computer security consultancy; Computer virus protection services; Cloud computing featuring soft...
G/S Computer diagnostic services; Computer security consultancy; Computer security consultancy in the...
G/S Computer hardware; wireless access points devices namely, wireless routers; computer software, co...
G/S Computer hardware; wireless access points devices; computer software, computer programs, and dow...
G/S Outsource service providers in the field of information technology; technical advice relating to ...
G/S Outsource service providers in the field of information technology; technical advice relating to...
G/S Computer programming services for the protection of software, data security services, computer so...
G/S Computer programming services for the protection of software; data security services; computer s...