2023
|
Invention
|
Intent-based orchestration of independent automations.
Systems and methods for intent-based orch... |
|
Invention
|
Detecting malicious behavior in a network using security analytics by analyzing process interacti... |
|
Invention
|
Systems and methods for fine grained forward testing for a ztna environment.
Systems, devices, a... |
|
Invention
|
Management of internet of things (iot) by security fabric.
The present invention relates to a me... |
|
Invention
|
Dynamic leaf determination for tree creations for high-speed network policy search during data pa... |
|
Invention
|
Machine learning for visual similarity-based phishing detection.
In one embodiment, a similarity... |
2022
|
G/S
|
Software as a service (SAAS) services, featuring software for use in providing cybersecurity moni... |
|
Invention
|
Systems and methods for four dimensional network session authorization. Various embodiments provi... |
|
Invention
|
Systems and methods for identifying security requirements in a ztna system.
Various embodiments ... |
|
Invention
|
Remote monitoring of a security operations center (soc).
Systems and methods for remote monitori... |
|
Invention
|
Systems and methods for sd-wan setup automation.
Various embodiments provide systems and methods... |
|
Invention
|
Unsupervised machine learning to derive optimal wireless connectivity thresholds for best network... |
|
Invention
|
Attaining rapid radio frequency (rf) channel inspection using intelligent transceiver scanning in... |
|
Invention
|
Optimizing policy tree searches with hybrid ranges of policy sets while examining network traffic... |
|
Invention
|
Remote cost based network traffic steering for heterogeneous links in a sdwan (software defined w... |
|
Invention
|
Utilizing color switch announcement frames to reduce frame collisions and retries for overlapping... |
|
Invention
|
Internet of things (iot) device identification using traffic patterns.
Flow pair values are iden... |
|
Invention
|
Distributed security fabric generation over multiple levels of network gateways.
Responsive to t... |
|
Invention
|
Firewall panic button for quarantining operational technology (ot) systems from real-time attacks... |
|
Invention
|
Adaptive multicast data rate configuration in managed wi-fi networks to improve throughput using ... |
|
Invention
|
Generating and managing message correction and retraction history from a chat server. Changes on ... |
|
Invention
|
Systems and methods for arbitrated failover control using countermeasures.
Various approaches fo... |
|
Invention
|
Systems and methods for generating soar playbooks. Various approaches are discussed for generatio... |
|
Invention
|
Systems and methods for security enhanced domain categorization.
Systems, devices, and methods a... |
|
Invention
|
Systems and methods for preventing data leaks over rtp or sip.
Systems, devices, and methods are... |
|
Invention
|
Systems and methods for cloud based root service application across multiple cooperative security... |
|
Invention
|
Steering wi-fi 6e wireless clients to wi-fi 6e access points on hybrid wireless networks.
A prob... |
|
Invention
|
Capturing multiuser data packets by grouping access points on a wireless network.
A capture grou... |
|
Invention
|
Remote debugging of local gui rendering by playing back a capture file to recreate a real-time lo... |
|
Invention
|
Chassis system management through data paths.
A firewall processing card from a plurality of fir... |
|
Invention
|
Identifying hidden service set identifiers (ssids) of unauthorized access points on a wireless ne... |
|
Invention
|
Systems and methods for controlling access to an unadvertised cloud-based resource.
Systems, dev... |
|
Invention
|
Systems and methods for implementing a family policy using a cooperative security fabric.
System... |
|
Invention
|
Systems and methods for context based access control in a bridge server.
Systems, devices, and m... |
|
Invention
|
Smart verification of authentication for user log ins based on risk levels.
Failures in authenti... |
|
Invention
|
One-time programming (otp) key revocation from a two-dimensional key storage structure of a syste... |
|
Invention
|
Containerized firewall in an embedded device for protecting against malicious data traffic on a d... |
|
Invention
|
Ai (artificial intelligence) driven dynamic self-remediation for wireless networks by dispatching... |
|
Invention
|
Steering fragmentation of data packets on data communication networks based on data packet size. ... |
|
Invention
|
Device identification for newly connecting devices using mac randomization on a network.
In iden... |
|
Invention
|
Virtual one-time programming (otp) to avoid dead chip during otp device programming.
Responsive ... |
|
Invention
|
Exploit predictive intrusion protection system (ep-ips) for data packet traffic on data communica... |
|
Invention
|
Ipsec load balancing in a session-aware load balanced cluster (slbc) network device.
A processin... |
|
Invention
|
System & methods for reducing delay in bss fast transitions between access points on wi-fi wirele... |
|
G/S
|
Data processing equipment; computer hardware; network hardware; network gateway hardware; softwar... |
|
Invention
|
Systems and methods for security policy application based upon a dual bitmap scheme.
Systems, de... |
|
Invention
|
Systems and methods for automated sd-wan performance rule formation. Systems, devices, and method... |
|
Invention
|
Systems and methods for security policy organization using a dual bitmap.
Systems, devices, and ... |
|
Invention
|
Systems and methods for enhanced key security in an sd-wan network environment. Systems, devices,... |
|
Invention
|
Systems and methods for container server protection.
Systems, devices, and methods are discussed... |
2021
|
Invention
|
Customized anomaly detection in sandbox software security systems using graph convolutional netwo... |
|
Invention
|
Distributed node discovery and overlay path management on a data communication network.
An initi... |
|
G/S
|
Computer hardware; data processors; data processing equipment, namely, content processors; networ... |
|
G/S
|
Operating system programs; computer operating programs and computer operating systems; computer s... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Computer hardw... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; LAN (local are... |
2018
|
G/S
|
Computer network gateway hardware and software for enabling
computer gateway services, namely, f... |
|
G/S
|
Computer consulting services; computer software and network
security research and development se... |
|
G/S
|
Operating system programs; Computer operating programs and computer operating systems; computer s... |
2015
|
G/S
|
Computer hardware; computer switches; Ethernet switches; Automatic transfer switches (ATS); compu... |
2014
|
G/S
|
computer services, namely, cloud hosting provider services; consulting services in the field of c... |
|
G/S
|
Providing return merchandise authorization services, namely, management of returned merchandise a... |
|
G/S
|
Electronic software updates, namely, downloadable computer software and associated data files for... |
|
G/S
|
Computer hardware; wide area and local area computer network hardware, firmware and software, for... |
|
G/S
|
Monitoring of computer systems for security purposes; consulting services in the field of maintai... |
2010
|
G/S
|
Computer network operating system featuring network
security, network management, processing of ... |
|
G/S
|
Computer consulting services, namely, computer software,
hardware, firmware, and network consult... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software, for managin... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for monitori... |
|
G/S
|
Electronic software updates, namely, downloadable computer
software and associated data files fo... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for promotin... |
2008
|
G/S
|
Computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for monitorin... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for promoting... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software, for managing... |
|
G/S
|
Computer software for protecting computer systems and mobile devices to promote network efficienc... |
2007
|
G/S
|
Computer hardware; network hardware; network gateway hardware; computer software; downloadable co... |
|
G/S
|
Computer hardware; network hardware; computer software; downloadable computer software; firmware;... |
2004
|
G/S
|
Hosting the websites on a computer server for a global computer network |
|
G/S
|
Computer hardware namely Computer Network Gateway. Network Security Consulting. |
|
G/S
|
Computer hardware namely Computer Network gateway. Network Security Consulting. |
2001
|
G/S
|
computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
computer network gateway hardware and software for enabling computer gateway services, namely, fo... |