2023
|
Invention
|
Methods and apparatus for detection of malicious documents using machine learning.
An apparatus ... |
|
Invention
|
Systems and methods for network security.
Methods, systems, and computer readable media for netw... |
|
Invention
|
Computer augmented threat evaluation.
An automated system attempts to characterize code as safe ... |
|
Invention
|
Cybersecurity configuration in a cloud environment.
The present teachings include automatically ... |
|
Invention
|
Endpoint with remotely programmable data recorder.
An endpoint coupled in a communicating relati... |
|
Invention
|
Live discovery of enterprise threats based on security query activity.
A threat management syste... |
|
Invention
|
Enterprise network threat detection.
In a threat management platform, a number of endpoints log ... |
|
P/S
|
Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls |
|
Invention
|
Techniques for detecting living-off-the-land binary attacks. In example embodiments, techniques a... |
|
Invention
|
Rapid development of malicious content detectors. Methods and systems are described for developin... |
|
Invention
|
Rapid development of malicious content detectors.
Methods and systems are described for developi... |
|
Invention
|
Using reputation to avoid false malware detections.
A variety of techniques are disclosed for de... |
|
Invention
|
Attribute relevance tagging in malware recognition.
In general, in one aspect, a method for mach... |
|
Invention
|
Persistent ip address allocation for virtual private network (vpn) clients. Systems and methods f... |
|
Invention
|
Augmented security recognition tasks.
A system for conducting a security recognition task, the s... |
|
Invention
|
Implementing a machine-learning model to identify critical systems in an enterprise environment. ... |
|
Invention
|
Techniques for detecting living-off-the-land binary attacks.
In example embodiments, techniques ... |
|
Invention
|
Security threat alert analysis and prioritization. A method for prioritizing security events comp... |
|
P/S
|
(Based on Use in Commerce) Authentication of data in the field of e-commerce and digital payments... |
|
Invention
|
Security threat remediation for network-accessible devices.
Various aspects related to methods, ... |
|
Invention
|
Restricted execution mode for network-accessible devices.
Various aspects related to methods, sy... |
|
P/S
|
Providing online non-downloadable digital goods, namely computer software, computer hardware, ele... |
|
Invention
|
Secure firewall configurations.
A kernel driver on an endpoint uses a process cache to provide a... |
|
Invention
|
Security of network traffic in a containerized computing environment. A method comprises monitori... |
|
P/S
|
(Based on Intent to Use) 3D spectacles; Downloadable augmented reality software for virtual reali... |
|
Invention
|
Centralized management of policies for network-accessible devices.
Various aspects related to me... |
|
P/S
|
Computer software; metaverse software; utility, security and cryptography software; computer soft... |
2022
|
Invention
|
Dynamic routing of application traffic to ztna connectors.
A cloud computing platform provides z... |
|
Invention
|
Hybrid appliance for zero trust network access to customer applications.
A zero trust network ac... |
|
Invention
|
Alias domains for accessing ztna applications.
A cloud computing platform provides zero trust ne... |
|
Invention
|
Domain ownership verification for a ztna service platform.
A cloud computing platform provides z... |
|
Invention
|
Validation of ztna configuration for a multi-tenant proxy environment.
A cloud-based platform fo... |
|
Invention
|
Cloud-based zero trust network access service.
Infrastructure for zero trust network access (ZTN... |
|
Invention
|
Scaling tunnels for zero trust network access appliances.
A cloud computing platform provides ze... |
|
Invention
|
Cloud-based zero trust network access services. Various modifications to a zero trust network acc... |
|
Invention
|
Systems and methods for implementing policy changes in multi-tenant environments. In one or more ... |
|
Invention
|
Pausing automatic software updates of virtual machines.
Adapting automatic software update behav... |
|
Invention
|
Secure hashing of large data files to verify file identity.
Secure hashing of large files to ver... |
|
Invention
|
Method and system for outbound spam mitigation. A method for mitigating outbound electronic messa... |
|
Invention
|
Security threat alert analysis and prioritization.
A method for prioritizing security events com... |
|
P/S
|
(Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones... |
|
Invention
|
Evaluating network flow risks.
A cluster of network flows is formed on the basis of a particular... |
|
Invention
|
Catalog for managing modular code.
A catalog of pipelines for modular coding integrates resource... |
|
Invention
|
Security compliance for modular code.
A catalog of pipelines for modular coding integrates resou... |
|
Invention
|
Persistent ip address allocation for virtual private network (vpn) clients.
Systems and methods ... |
|
Invention
|
Digital certificate malicious activity detection.
Systems and methods for detecting malicious ac... |
|
Invention
|
Traffic scanning with context-aware threat signatures.
Threat management devices and methods. Th... |
|
P/S
|
(Based on 44(d) Priority Application) Downloadable computer software for controlling and managing... |
|
P/S
|
Downloadable computer software, downloadable computer programs, and downloadable mobile applicati... |
|
Invention
|
Deduplication of endpoint images.
A threat management facility for an enterprise provides securi... |
|
Invention
|
Methods and apparatus for machine learning to generate a decision tree database to identify comma... |
|
P/S
|
(Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB com... |
|
P/S
|
Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware... |
|
P/S
|
Computer hardware; wireless access points; computer
software, computer programs, and downloadabl... |
|
P/S
|
Computer hardware; wireless access points; computer software, computer programs, and downloadable... |
|
Invention
|
Security threat monitoring for network-accessible devices.
Various aspects related to threat man... |
|
P/S
|
Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s... |
|
P/S
|
Computer hardware, namely, for data networking; Downloadable computer software for managing, conf... |
|
P/S
|
Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a... |
|
Invention
|
Natural language analysis of a command line using a machine learning model to generate a natural ... |
|
Invention
|
Methods and apparatus for visualization of machine learning malware detection models.
Embodiment... |
|
Invention
|
Methods and apparatus for natural language interface for constructing complex database queries.
... |
|
Invention
|
Methods and apparatus for augmenting training data using large language models.
In some embodime... |
|
Invention
|
Assessing behavior patterns and reputation scores related to email messages.
A computer-implemen... |
|
P/S
|
Computer programming services for the protection of software; data security services; computer so... |
|
P/S
|
Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat... |
|
P/S
|
Computer hardware; computer software; wireless access points; computer software, computer program... |
|
P/S
|
Downloadable electronic publications in the nature of manuals, technical documentation, brochures... |
|
P/S
|
Downloadable security software to provide cybersecurity protection; computer hardware; wireless a... |
2021
|
P/S
|
(Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf... |
|
P/S
|
(Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ... |
|
P/S
|
Computer security consultancy; Computer virus protection services; Cloud computing featuring soft... |
|
P/S
|
Computer diagnostic services; Computer security consultancy; Computer security consultancy in the... |
|
P/S
|
Computer hardware; wireless access points devices namely, wireless routers; computer software, co... |
|
P/S
|
Computer hardware; wireless access points devices; computer
software, computer programs, and dow... |
|
P/S
|
Outsource service providers in the field of information technology; technical advice relating to ... |
|
P/S
|
Outsource service providers in the field of information
technology; technical advice relating to... |
|
P/S
|
Computer programming services for the protection of software, data security services, computer so... |
|
P/S
|
Computer programming services for the protection of
software; data security services; computer s... |