2024
|
P/S
|
Computer software and firmware for monitoring and controlling online traffic to computer servers;... |
|
P/S
|
Computer software and firmware for monitoring and
controlling online traffic to computer servers... |
2023
|
P/S
|
Providing virtual private network (VPN) services, namely, private and secure electronic communica... |
|
Invention
|
Selection of an egress ip address for egress traffic of a distributed cloud computing network.
A... |
|
Invention
|
Cloud computing platform that executes code in a distributed cloud computing network.
A compute ... |
|
Invention
|
Cloud-based security service that includes external evaluation for accessing a third-party applic... |
|
Invention
|
Secure private traffic exchange in a unified network service.
Traffic is received at an interfac... |
|
Invention
|
Traffic load balancing between a plurality of points of presence of a cloud computing infrastruct... |
|
Invention
|
Authoritative domain name system (dns) server responding to dns requests with ip addresses select... |
|
Invention
|
State management and object storage in a distributed cloud computing network.
A first compute se... |
|
Invention
|
Cache purging in a distributed networked system. Purging resources from a cache in a distributed ... |
|
P/S
|
Providing online non-downloadable computer software platforms for enabling third-party cloud comp... |
|
P/S
|
Platform as a service (PAAS) featuring computer software platforms for use in enabling third-part... |
|
Invention
|
Identity-based policy enforcement for sim devices.
Traffic is received at a distributed cloud co... |
|
Invention
|
Isolating suspicious links in email messages. Isolating suspicious email links is described. An e... |
|
Invention
|
Inter-process serving of machine learning features from mapped memory for machine learning models... |
|
Invention
|
Web browser remoting across a network using draw commands.
A server receives from a client devic... |
|
Invention
|
Application remoting across a network using draw commands.
A server receives from a client devic... |
|
Invention
|
Remoting application across a network using draw commands with an isolator application.
A client... |
|
Invention
|
Method and system for determining a path maximum transmission unit (mtu) between endpoints of a g... |
|
Invention
|
Methods and apparatuses for providing internet-based proxy services.
A proxy server receives, fr... |
|
Invention
|
Establishing a cryptographic tunnel between a first tunnel endpoint and a second tunnel endpoint ... |
|
Invention
|
Unified network service that connects multiple disparate private networks and end user client dev... |
|
Invention
|
Distributed key management system with a key lookup service. A first intermediate key management ... |
|
Invention
|
Distributed key management system.
A distributed key management system (KMS) includes a central ... |
|
Invention
|
Persisting encrypted remote browser data at a local browser for use in a remote browser.
A remot... |
|
Invention
|
Enforcing security policies in a zero trust security framework using a behavioral score. A manage... |
|
Invention
|
Dynamic selection of where to execute application code in a distributed cloud computing network. ... |
|
Invention
|
Machine learning based web application firewall. A machine learning (ML) based web application fi... |
|
Invention
|
Method and apparatus for traffic optimization in virtual private networks (vpns). Traffic optimiz... |
|
Invention
|
Machine learning-based malicious attachment detector.
In an embodiment, a computer-implemented m... |
|
Invention
|
Verification of selected inbound electronic mail messages. An email verification system is descri... |
|
Invention
|
Secure session capability using public-key cryptography without access to the private key.
A ser... |
2022
|
Invention
|
Cloud computing platform that executes third-party code in a distributed cloud computing network.... |
|
Invention
|
Dynamically modifying http connections. A condition exists that triggers an HTTP server to modify... |
|
Invention
|
Intelligently routing internet traffic. A request from a client device is received at a first one... |
|
Invention
|
Loading and managing third-party tools on a website.
Managing the loading of third-party tools o... |
|
Invention
|
Network layer performance and security provided by a distributed cloud computing network. A GRE t... |
|
Invention
|
Selective traffic processing in a distributed cloud computing network. A server receives internet... |
|
Invention
|
Modifying the congestion control algorithm applied to a connection based on request characteristi... |
|
Invention
|
Internet protocol security (ipsec) tunnel using anycast at a distributed cloud computing network.... |
|
Invention
|
Secure private traffic exchange in a unified network service. Traffic is received at an interface... |
|
Invention
|
Isolating internet-of-things (iot) devices using a secure overlay network. A server of a distribu... |
|
Invention
|
Method and apparatus for distributed emulation of behavior of a malicious domain.
Methods and ap... |
|
Invention
|
Non-http layer 7 protocol applications running in the browser. A server receives from a browser e... |
|
Invention
|
Distributed key management system. A distributed key management system (KMS) includes a central K... |
|
Invention
|
Mobile accelerator. A mobile accelerator system includes point of presences (POPs) that includes ... |
|
Invention
|
Implementing a tiered cache topology with anycast networks. A control server receives probe data ... |
|
Invention
|
Responding to search requests based on referrer. For each network resource request received at a ... |
|
Invention
|
Protecting internet of things (iot) devices at the network level.
An Internet of Things (IoT) pr... |
|
Invention
|
Identity proxy and access gateway. A server transmits to a third-party application a request for ... |
|
P/S
|
Computer network security consultancy |
|
Invention
|
Generating early hints informational responses at an intermediary server.
An intermediary server... |
|
Invention
|
Phishing email campaign identification. A computer-implemented method, executed by one or more em... |
2021
|
P/S
|
Providing temporary use of online non-downloadable cloud computing software for controlling how e... |
|
P/S
|
Providing Domain Name System (DNS) services, namely, providing a network of authoritative name se... |
|
P/S
|
Computer programming services for edge computing |
|
P/S
|
Computer network services, namely, providing network communication services in the nature of tran... |
|
P/S
|
Computer security threat analysis for protecting data |
|
P/S
|
Software as a service (SAAS) services featuring software for customizable network traffic managem... |
|
P/S
|
Authentication, issuance and validation of digital certificates; Computer security threat analysi... |
|
P/S
|
Downloadable software for blocking, allowing, routing and resolution of queries of protected data... |
2020
|
P/S
|
Providing user access to global computer networks Computer security services, namely, restricting... |
2019
|
P/S
|
Downloadable software for enabling virtual private network (VPN) operation on electronic devices;... |
|
P/S
|
Downloadable cloud-computing software for network management; downloadable computer software prog... |
|
P/S
|
Downloadable cloud-computing software for network management; Downloadable computer software prog... |
|
P/S
|
Computer services, namely, providing a service to monitor
and control online traffic to computer... |
|
P/S
|
Computer software, namely, computer software to monitor and
control online traffic to computer s... |
2017
|
P/S
|
Providing a web site that features information on computer technology and programming |
2016
|
P/S
|
software as a service (SAAS) for use in identifying and responding to computer security vulnerabi... |
|
P/S
|
providing online non-downloadable data analysis software; providing online non-downloadable compu... |
|
P/S
|
Providing online non-downloadable computer software for sensing computer security threats; provid... |
2013
|
P/S
|
Computer software, namely, computer software to monitor and control online traffic to computer se... |
2011
|
P/S
|
computer services, namely, providing a service to monitor and control online traffic to computer ... |
2010
|
P/S
|
computer software, namely, computer software to monitor and control online traffic to computer se... |
|
P/S
|
Computer services, namely, providing a service to monitor and control online traffic to computer ... |