2023
|
Invention
|
Adjusting behavior of an endpoint security agent based on network location.
Systems and methods ... |
|
Invention
|
Detecting access points located within proximity of a computing device for troubleshooting of a n... |
|
Invention
|
Machine-learning based approach for dynamically generating incident-specific playbooks for a secu... |
2022
|
Invention
|
Ptive resource provisioning for a multi-tenant distributed event data store.
Systems and methods... |
|
Invention
|
Secure link aggregation.
Systems and methods are for securing link aggregation are provided. Acc... |
|
G/S
|
Software as a service (SAAS) services, featuring software for use in providing cybersecurity moni... |
|
Invention
|
Systems and methods for hierarchical facial image clustering.
Various systems and methods for fo... |
|
Invention
|
Cloud-based orchestration of incident response using multi-feed security event classifications.
... |
|
Invention
|
Systems and methods for generating synthetic data representing insider attacks.
Systems, methods... |
|
Invention
|
Systems and methods for detecting insider attacks on a communication network.
Systems, methods, ... |
|
Invention
|
Systems and methods for training an insider attack model using images having both region specific... |
|
Invention
|
Systems and methods for encoding behavioral information into an image domain for processing.
Sys... |
|
Invention
|
Systems and methods for enabling detection of threats based upon color.
Systems, devices, and me... |
|
Invention
|
Systems and methods for indicating connection relevance in a network environment. Systems, device... |
|
G/S
|
Data processing equipment; computer hardware; network hardware; network gateway hardware; softwar... |
|
Invention
|
Systems and methods for preparing code for malicious behavior analysis.
Systems, devices, and me... |
|
Invention
|
Systems and methods for rapid natural language based message categorization.
Systems, devices, a... |
|
Invention
|
Systems and methods for using vector model normal exclusion in natural language processing to cha... |
2021
|
G/S
|
Computer hardware; data processors; data processing equipment, namely, content processors; networ... |
|
G/S
|
Operating system programs; computer operating programs and computer operating systems; computer s... |
|
Invention
|
Systems and methods for graphical runtime validated report generation.
Systems, devices, and met... |
|
Invention
|
Fqdn (fully qualified domain name) routes optimization in sdwan (software-defined wide area netwo... |
|
Invention
|
Access point with modular internal/external antenna support.
An access point has a housing with ... |
|
Invention
|
Remote cost based network traffic steering for heterogeneous links in a sdwan (software defined w... |
|
Invention
|
Systems and methods for deobfuscation of executable code.
Systems, devices, and methods are disc... |
|
Invention
|
Systems and methods for unpacking protected data from obfuscated code.
Systems, devices, and met... |
|
Invention
|
Systems and methods for processing multiple ip packet types in a network environment.
Systems, d... |
|
Invention
|
Machine learning systems and methods for exponentially scaled regression for spatial based model ... |
|
Invention
|
Selectively applying dynamic malware analysis to software files based on compression type in a so... |
|
Invention
|
Preventing dhcp pool exhaustion and starvation with centralized arp protocol messages.
A low num... |
|
Invention
|
Artificial virtual machine for preventing malware execution by applying virtual machine character... |
|
Invention
|
Automatic configuration of sd-wan link rules on a per application basis using real-time network c... |
|
Invention
|
Intelligent selection of physical layer transmission types in 802.11ax based wi-fi networks. A tr... |
|
Invention
|
Container network interface for applying security policies to network traffic of containers.
A s... |
|
Invention
|
Proxy ssh public key authentication in cloud environment.
A SSH (secure shell) public key is rec... |
|
Invention
|
Artificial intelligence for real-time e-mail sentiment analysis for brand protection.
An e-mail ... |
|
Invention
|
Non-interfering access layer end-to-end encryption for iot devices over a data communication net... |
|
Invention
|
Role based ofdma subcarriers allocation over wireless networks using radius protocol.
Access cre... |
|
Invention
|
Systems and methods for incorporating passive wireless monitoring with video surveillance.
Vario... |
|
Invention
|
Systems and methods for internal secure network resolution.
Systems, devices, and methods are di... |
|
Invention
|
Systems and methods for quantifying file access risk exposure by an endpoint in a network environ... |
|
Invention
|
Systems and methods for automated risk-based network security focus.
Systems, devices, and metho... |
|
Invention
|
Systems and methods for posture checking across local network zone ztna control.
Systems, device... |
|
Invention
|
Systems and methods for governing vpn access using a remote device in proximity to a vpn endpoint... |
|
Invention
|
Machine learning systems and methods for api discovery and protection by url clustering with sche... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Computer hardw... |
|
Invention
|
Recommendation of granular traffic thresholds from multiple sensor appliances.
Recommendations a... |
|
Invention
|
Automatic link aggregation for incompatible data ports on a computer network.
An aggregate port ... |
|
Invention
|
Machine learning capable mac filtering for enforcing edge security over mac randomization in wlan... |
|
Invention
|
Preventing wireless connections to an unauthorized access point on a data communication network u... |
|
Invention
|
Enforcing javascript for mitb detection.
A request for a confidential web page, and in response,... |
|
Invention
|
Machine learning and artificial intelligence model-based data delivery for iot devices co-existin... |
|
Invention
|
Ngfw (next generation firewall) security inspection over multiple sessions of message session rel... |
|
Invention
|
Machine learning systems and methods for classification based auto-annotation.
Among a great dea... |
|
Invention
|
Machine learning systems and methods for regression based active learning.
Among a great deal of... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; LAN (local are... |
2018
|
G/S
|
Computer network gateway hardware and software for enabling
computer gateway services, namely, f... |
|
G/S
|
Computer consulting services; computer software and network
security research and development se... |
|
G/S
|
Operating system programs; Computer operating programs and computer operating systems; computer s... |
2015
|
G/S
|
Computer hardware; computer switches; Ethernet switches; Automatic transfer switches (ATS); compu... |
2014
|
G/S
|
computer services, namely, cloud hosting provider services; consulting services in the field of c... |
|
G/S
|
Providing return merchandise authorization services, namely, management of returned merchandise a... |
|
G/S
|
Electronic software updates, namely, downloadable computer software and associated data files for... |
|
G/S
|
Computer hardware; wide area and local area computer network hardware, firmware and software, for... |
|
G/S
|
Monitoring of computer systems for security purposes; consulting services in the field of maintai... |
2010
|
G/S
|
Computer network operating system featuring network
security, network management, processing of ... |
|
G/S
|
Computer consulting services, namely, computer software,
hardware, firmware, and network consult... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software, for managin... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for monitori... |
|
G/S
|
Electronic software updates, namely, downloadable computer
software and associated data files fo... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for promotin... |
2008
|
G/S
|
Computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for monitorin... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for promoting... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software, for managing... |
|
G/S
|
Computer software for protecting computer systems and mobile devices to promote network efficienc... |
2007
|
G/S
|
Computer hardware; network hardware; network gateway hardware; computer software; downloadable co... |
|
G/S
|
Computer hardware; network hardware; computer software; downloadable computer software; firmware;... |
2004
|
G/S
|
Hosting the websites on a computer server for a global computer network |
|
G/S
|
Computer hardware namely Computer Network Gateway. Network Security Consulting. |
|
G/S
|
Computer hardware namely Computer Network gateway. Network Security Consulting. |
2001
|
G/S
|
computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
computer network gateway hardware and software for enabling computer gateway services, namely, fo... |