Forcepoint, LLC

United States of America


 
Total IP 243
Total IP Rank # 5,156
IP Activity Score 3.1/5.0    237
IP Activity Rank # 2,975
Dominant Nice Class Scientific and electric apparatu...

Patents

Trademarks

228 5
0 4
0 5
1
 
Last Patent 2023 - Adaptive trust profile reference...
First Patent 1998 - Method and system for monitoring...
Last Trademark 2020 - F
First Trademark 2007 - ThreatSeeker

Industry (Nice Classification)

Latest Inventions, Goods, Services

2022 Invention Adaptive trust profile reference architecture. A system, method, and computer-readable medium are...
Invention Entity behavior catalog architecture. A system, method, and computer-readable medium are disclose...
2021 Invention Efficient matching of feature-rich security policy with dynamic content using user group matching...
Invention Managing data schema differences by path deterministic finite automata. A method for migrating a ...
Invention Web endpoint device having automatic switching between proxied and non-proxied communication mode...
Invention Risk adaptive protection. A method, system and computer-usable medium for generating a user behav...
Invention Security system using pseudonyms to anonymously identify entities and corresponding security risk...
Invention Multi-access interface for internet protocol security. A method may include providing a multi-acc...
Invention Using content stored in an entity behavior catalog when performing a human factor risk operation....
Invention Entity behavior catalog access management. A system, method, and computer-readable medium are dis...
Invention Providing an endpoint with an entity behavior profile feature pack. A system, method, and comput...
Invention Cloud-based explicit proxy with private access feature set. A system for processing data is discl...
Invention Policy integration for cloud-based explicit proxy. A system for processing data that includes a ...
2020 Invention Message phishing detection using machine learning characterization. An email phishing detection m...
Invention Associating a security risk persona with a phase of a cyber kill chain. A system, method, and com...
Invention User behavior profile including temporal detail corresponding to user interaction. A system, meth...
Invention Human factors framework. A system, method, and computer-readable medium are disclosed for perform...
Invention Using indicators of behavior to identify a security persona of an entity. A system, method, and c...
Invention Using human factors when performing a human factor risk operation. A system, method, and computer...
Invention Using indicators of behavior when performing a security operation. A system, method, and computer...
Invention Analyzing an event enacted by a data entity when performing a security operation. A system, metho...
Invention System and method for efficient fingerprinting in cloud multitenant data loss prevention. A data ...
Invention Cloud-based explicit proxy. A system for processing data, comprising a first processor configured...
Invention Risk-adaptive dns forwarder. A method, system, and computer-usable medium are disclosed for: (i)...
Invention Applying reduction functions to anomalous event risk score. A system, method, and computer-readab...
Invention Security analytics mapping system. A system, method, and computer-readable medium are disclosed f...
Invention Risk score calculation and distribution. A system, method, and computer-readable medium are discl...
Invention Using an entity reputation when calculating an entity risk score. A system, method, and computer-...
Invention Anomaly detection using endpoint counters. A system, method, and computer-readable medium are dis...
Invention Cybersecurity system having security policy visualization. A system, method, and computer-readabl...
Invention Method, system, and apparatus for probabilistic identification of encrypted files. A mechanism fo...
Invention Progressive trigger data and detection model. A system, method, and computer-readable medium are...
Invention Cybersecurity system having digital certificate reputation system. A system, method, and computer...
Invention Shared pipeline for multiple services. A processor-implemented method for a continuous deployment...
Invention System and method for creating buffered firewall logs for reporting. A system for firewall data l...
Invention Human-centric risk modeling framework. A system, method, and computer-readable medium are disclos...
G/S Computer hardware; downloadable computer software, namely, downloadable software for the creation...
G/S Computer hardware; downloadable computer software, namely, downloadable software for the creatio...
Invention Containerized infrastructure for deployment of microservices. A method, system and computer-usabl...
Invention Security analytics system configured to instantiate user behavior baselines using historical data...
Invention Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology. A sy...
Invention Defining groups of behaviors for storage within an entity behavior catalog. A system, method, and...
Invention Inferring a scenario when performing a security operation using an entity behavior catalog. A sys...
Invention Disrupting a cyber kill chain when performing security operations. A system, method, and computer...
Invention Determining an abstraction level for contents of an entity behavior catalog. A system, method, a...
Invention Representing sets of behaviors within an entity behavior catalog. A system, method, and computer-...
Invention Using an entity behavior catalog when performing security operations. A system, method, and compu...
Invention External trigger induced behavioral analyses. A mechanism is provided for using triggered stimuli...
Invention Identification of unknown traffic based on transport layer security extensions. A system for prov...
G/S Providing computer software services in the nature of software as a service (SAAS) services featu...
Invention Automated renewal of certificates across a distributed computing security system. A system for da...
2017 G/S Computer hardware; computer software, namely, software for the creation of firewalls, software f...
2016 G/S Computer hardware, computer software for security and protection, namely, software for the creati...
G/S Computer hardware, computer software, computer software for security and protection, computer so...
2015 G/S Computer hardware; computer software, namely, software for the creation of firewalls, software fo...
2007 G/S Computer software for web, hardware, network, computer and internet security.
G/S Computer software for web, hardware, network, computer and internet security.