2020
|
P/S
|
Downloadable enterprise software for monitoring the security of cloud environments. Software as a... |
|
P/S
|
Downloadable enterprise software for monitoring the security
of cloud environments. Software as ... |
|
P/S
|
Downloadable enterprise software for monitoring the security of cloud environments Software as a ... |
2018
|
Invention
|
Platform and method for enhanced-cyber-attack detection and response employing a global data stor... |
|
Invention
|
Platform and method for retroactive reclassification employing a cybersecurity-based global data ... |
|
Invention
|
System and method for analyzing binary code for malware classification using artificial neural ne... |
|
Invention
|
Intelligent system for mitigating cybersecurity risk by analyzing domain name system traffic metr... |
|
Invention
|
Intelligent system for mitigating cybersecurity risk by analyzing domain name system traffic.
A ... |
|
Invention
|
Phishing attack detection. A computerized method for analyzing a subject URL to determine whether... |
|
Invention
|
Cyber-security system and method for weak indicator detection and correlation to generate strong ... |
|
Invention
|
Attribute-controlled malware detection. A computerized method for authenticating access to a subs... |
|
Invention
|
System and method for predicting and mitigating cybersecurity system misconfigurations. A compute... |
2016
|
Invention
|
Launcher for setting analysis environment variations for malware detection. A system and method f... |
|
Invention
|
Systems and methods for analyzing pdf documents. A system and method for detecting malicious acti... |
|
Invention
|
Method, apparatus, and computer-readable medium for encoding repetition and definition level valu... |
2015
|
Invention
|
Intelligent context aware user interaction for malware detection. According to one embodiment, a ... |
|
Invention
|
Microvisor-based malware detection endpoint architecture. A threat-aware microvisor may be deploy... |
|
Invention
|
Microvisor-based malware detection endpoint architecture.
A threat-aware microvisor may be deplo... |
|
P/S
|
Computer software and hardware for digital security; computer software and computer hardware for ... |
|
P/S
|
Computer software and hardware for digital security;
computer security products, namely, compute... |
|
Invention
|
System and method to communicate sensitive information via one or more untrusted intermediate nod... |
|
Invention
|
Trusted threat-aware microvisor. A trusted threat-aware microvisor may be deployed as a module of... |
|
Invention
|
Verification of trusted threat-aware microvisor. A trusted threat-aware microvisor may be deploye... |
|
Invention
|
Malware detection and remediation for endpoint devices. According to one embodiment, a computeriz... |
|
Invention
|
Malware detection and remediation for endpoint deviced. According to one embodiment, a computeriz... |
|
Invention
|
Method, apparatus, and computer-readable medium for efficient subnet identification.
An apparatu... |
|
Invention
|
Systems and methods for scheduling analysis of network content for malware.
A method for detecti... |
2014
|
Invention
|
System, apparatus and method for automatically verifying exploits within suspect objects and high... |
|
Invention
|
Threat-aware microvisor. A threat-aware microvisor is configured to facilitate real-time security... |
|
Invention
|
Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network e... |
|
Invention
|
Exploit detection system with threat-aware microvisor. An exploit detection system deploys a thre... |
|
Invention
|
System, apparatus and method for using malware analysis results to drive adaptive instrumentation... |
|
Invention
|
Dynamically adaptive framework and method for classifying malware using intelligent static, emula... |
|
Invention
|
Advanced persistent threat (apt) detection center. A computerized method is described in which on... |
|
Invention
|
Malware detection based on vm behavioral analysis and machine learning classification. A computer... |
|
Invention
|
System and method for detecting malicious links in electronic messages. According to one embodime... |
|
Invention
|
Zero-day discovery system. A method for determining a zero-day attack by an electronic device is ... |
|
Invention
|
System and method for detecting time-bomb malware. According to one embodiment, a system comprise... |
2013
|
P/S
|
Computer software and hardware for digital security; computer software, namely, security software... |
|
P/S
|
Training with respect to detection of malware, unauthorized activities and intrusions, and remedi... |
|
P/S
|
Computer software and hardware for digital security; computer security products, namely, computer... |
|
Invention
|
Method and system for analyzing data related to an event.
A system and method for analyzing data... |
|
Invention
|
Method and system for collecting and organizing data corresponding to an event.
A system and met... |
|
Invention
|
Optimized resource allocation for virtual machines within a malware content detection system. Acc... |
2012
|
Invention
|
Electronic message analysis for malware detection. An electronic message is analyzed for malware ... |
|
Invention
|
Systems and methods for detecting malicious pdf network content. Systems and methods for detectin... |
2006
|
P/S
|
Computer hardware; computer software; computer peripherals;
computer software for monitoring, fi... |
2005
|
P/S
|
Computer hardware; computer peripherals; computer software for monitoring, filtering and reportin... |