2022
|
Invention
|
Adaptive trust profile reference architecture. A system, method, and computer-readable medium are... |
|
Invention
|
Entity behavior catalog architecture. A system, method, and computer-readable medium are disclose... |
2021
|
Invention
|
Efficient matching of feature-rich security policy with dynamic content using user group matching... |
|
Invention
|
Managing data schema differences by path deterministic finite automata. A method for migrating a ... |
|
Invention
|
Web endpoint device having automatic switching between proxied and non-proxied communication mode... |
|
Invention
|
Risk adaptive protection. A method, system and computer-usable medium for generating a user behav... |
|
Invention
|
Security system using pseudonyms to anonymously identify entities and corresponding security risk... |
|
Invention
|
Multi-access interface for internet protocol security. A method may include providing a multi-acc... |
|
Invention
|
Using content stored in an entity behavior catalog when performing a human factor risk operation.... |
|
Invention
|
Entity behavior catalog access management. A system, method, and computer-readable medium are dis... |
|
Invention
|
Providing an endpoint with an entity behavior profile feature pack.
A system, method, and comput... |
|
Invention
|
Cloud-based explicit proxy with private access feature set. A system for processing data is discl... |
|
Invention
|
Policy integration for cloud-based explicit proxy.
A system for processing data that includes a ... |
2020
|
Invention
|
Message phishing detection using machine learning characterization. An email phishing detection m... |
|
Invention
|
Associating a security risk persona with a phase of a cyber kill chain. A system, method, and com... |
|
Invention
|
User behavior profile including temporal detail corresponding to user interaction. A system, meth... |
|
Invention
|
Human factors framework. A system, method, and computer-readable medium are disclosed for perform... |
|
Invention
|
Using indicators of behavior to identify a security persona of an entity. A system, method, and c... |
|
Invention
|
Using human factors when performing a human factor risk operation. A system, method, and computer... |
|
Invention
|
Using indicators of behavior when performing a security operation. A system, method, and computer... |
|
Invention
|
Analyzing an event enacted by a data entity when performing a security operation. A system, metho... |
|
Invention
|
System and method for efficient fingerprinting in cloud multitenant data loss prevention. A data ... |
|
Invention
|
Cloud-based explicit proxy. A system for processing data, comprising a first processor configured... |
|
Invention
|
Risk-adaptive dns forwarder.
A method, system, and computer-usable medium are disclosed for: (i)... |
|
Invention
|
Applying reduction functions to anomalous event risk score. A system, method, and computer-readab... |
|
Invention
|
Security analytics mapping system. A system, method, and computer-readable medium are disclosed f... |
|
Invention
|
Risk score calculation and distribution. A system, method, and computer-readable medium are discl... |
|
Invention
|
Using an entity reputation when calculating an entity risk score. A system, method, and computer-... |
|
Invention
|
Anomaly detection using endpoint counters. A system, method, and computer-readable medium are dis... |
|
Invention
|
Cybersecurity system having security policy visualization. A system, method, and computer-readabl... |
|
Invention
|
Method, system, and apparatus for probabilistic identification of encrypted files. A mechanism fo... |
|
Invention
|
Progressive trigger data and detection model.
A system, method, and computer-readable medium are... |
|
Invention
|
Cybersecurity system having digital certificate reputation system. A system, method, and computer... |
|
Invention
|
Shared pipeline for multiple services. A processor-implemented method for a continuous deployment... |
|
Invention
|
System and method for creating buffered firewall logs for reporting. A system for firewall data l... |
|
Invention
|
Human-centric risk modeling framework. A system, method, and computer-readable medium are disclos... |
|
G/S
|
Computer hardware; downloadable computer software, namely, downloadable software for the creation... |
|
G/S
|
Computer hardware; downloadable computer software, namely,
downloadable software for the creatio... |
|
Invention
|
Containerized infrastructure for deployment of microservices. A method, system and computer-usabl... |
|
Invention
|
Security analytics system configured to instantiate user behavior baselines using historical data... |
|
Invention
|
Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology.
A sy... |
|
Invention
|
Defining groups of behaviors for storage within an entity behavior catalog. A system, method, and... |
|
Invention
|
Inferring a scenario when performing a security operation using an entity behavior catalog. A sys... |
|
Invention
|
Disrupting a cyber kill chain when performing security operations. A system, method, and computer... |
|
Invention
|
Determining an abstraction level for contents of an entity behavior catalog.
A system, method, a... |
|
Invention
|
Representing sets of behaviors within an entity behavior catalog. A system, method, and computer-... |
|
Invention
|
Using an entity behavior catalog when performing security operations. A system, method, and compu... |
|
Invention
|
External trigger induced behavioral analyses. A mechanism is provided for using triggered stimuli... |
|
Invention
|
Identification of unknown traffic based on transport layer security extensions. A system for prov... |
|
G/S
|
Providing computer software services in the nature of software as a service (SAAS) services featu... |
|
Invention
|
Automated renewal of certificates across a distributed computing security system. A system for da... |
2017
|
G/S
|
Computer hardware; computer software, namely, software for
the creation of firewalls, software f... |
2016
|
G/S
|
Computer hardware, computer software for security and protection, namely, software for the creati... |
|
G/S
|
Computer hardware, computer software, computer software for
security and protection, computer so... |
2015
|
G/S
|
Computer hardware; computer software, namely, software for the creation of firewalls, software fo... |
2007
|
G/S
|
Computer software for web, hardware, network, computer and internet security. |
|
G/S
|
Computer software for web, hardware, network, computer and internet security. |