Palo Alto Networks, Inc.

United States of America


Create a watch for Palo Alto Networks, Inc.
Total IP 1,348
Total IP incl. subs 1,349 (+ 1 for subs)
Total IP Rank # 1,018
IP Activity Score 3.8/5.0    1,227
IP Activity Rank # 591
Stock Symbol
ISIN US6974351057
Market Cap. 127,600M  (USD)
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

1,173 33
4 18
98 15
7
 
Last Patent 2025 - Ai-enabled device ownership iden...
First Patent 1994 - Remote smart filtering communica...
Last Trademark 2025 - AGENTIX
First Trademark 2007 - PAN-OS

Subsidiaries

1 subsidiaries with IP (1 patents, 0 trademarks)

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2025 G/S Downloadable computer software for computer network security; downloadable computer software for...
G/S Computer hardware; Downloadable security software for sharing and storing sensitive information o...
G/S Downloadable computer software for an enterprise browser for secure web browsing, internet access...
G/S Downloadable computer software for computer network security protection; Downloadable computer so...
G/S platform as a service (PAAS) featuring computer software platforms for managing unified data in t...
G/S Platform as a service (PAAS) featuring computer software platforms for managing unified data in t...
Invention Adversarial training for malicious protocol data unit detection with field value perturbations. ...
Invention Iot adaptive threat prevention. IoT adaptive threat prevention is disclosed. Network traffic rec...
Invention Machine learning architecture for detecting malicious files using stream of data. The present ap...
Invention Inline inspection cybersecurity enforcement of multipart file transmissions. Separating awarenes...
G/S Downloadable computer software for computer network security; Downloadable computer software for ...
Invention Deploying symmetric routing. Techniques for deploying symmetric routing are disclosed. A system,...
Invention Security policy enforcement and visibility for network traffic with masked source addresses. Som...
Invention Securely deliver decrypted data of mirrored vpn traffic. An orchestrator that manages security a...
Invention Malware detection for documents using knowledge distillation assisted learning. The detection of...
G/S Providing temporary use of online non-downloadable cloud native software application protection p...
G/S Providing temporary use of online non-downloadable cloud native software application protection ...
Invention Sd-wan iot security posture management. Increasing use of web-based applications or Software-as-...
Invention High availability of cloud-based services with address translation. Described herein are systems...
Invention Multiple data center compatible deployment of applications matching a wildcard domain name. A ne...
G/S Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth...
Invention Network attack detection with targeted feature extraction from exploit tools. The present applic...
Invention Selective intelligent enforcement in mobile networks. In some embodiments, a system/process/comp...
Invention Inline ransomware detection via server message block (smb) traffic. Inline detection of ransomwa...
Invention Strategically aged domain detection. Detection of strategically aged domains is detected. A set ...
G/S Downloadable computer software for use as a security platform with security operations capabiliti...
G/S Downloadable computer software for computer network security; downloadable computer software for ...
Invention Secure access service edge for mobile networks. Techniques for providing security for providing S...
Invention Service access service edge solution for providing enhanced security for unmanaged devices for mo...
Invention Service access service edge solution for providing enhanced security for mobile networks. Techniq...
Invention Explicit proxy solutions for 5g security with service access service edge (sase) with service pro...
Invention Zero trust network access solution for 5g sase with explicit proxy. In some embodiments, a system...
Invention Visual deep learning for inline phishing detection. Techniques for visual deep learning for inlin...
Invention Deep learning in a data plane. Various techniques for deep learning in a data plane are disclosed...
Invention Preventing edr termination using vulnerable drivers. Methods, storage systems and computer progra...
2024 Invention Contextual identifier-attribute mappings for large language models. A contextual natural language...
Invention Modifying a user query to prevent hallucinations. A user query that includes a natural language d...
Invention Service access service edge solution for providing enhanced security for mobile networks. Techni...
Invention Ai-enabled device ownership identification for securing nationwide critical infrastructure system...
Invention Viscad: visual-guided campaign auto-discovery. The present application discloses a method, syste...
Invention Auto-tagging of sanctioned saas applications. A system has been created to automatically identif...
Invention Structuring ipv6 addresses into bit fields to embed language localization and services. Techniqu...
Invention Securing embedded link access in emails using isolation context. The present application disclos...
Invention Robust long-term resource usage forecasting and multi-trend classification. The present applicat...
Invention Ml based domain risk scoring and its applications to advanced url filtering. The present applica...
G/S Software as a service (SAAS) services featuring software using artificial intelligence for the mo...
G/S Software as a service (SAAS) services featuring software using artificial intelligence for the m...
Invention Cve labeling for exploits using proof-of-concept and llm. The disclosed system determines a CVE ...
Invention Knowledge base and interface for efficient response to user queries. A knowledge base is built, ...
Invention Maintaining stable uniform resource locator verdicts with intelligent recrawling. A stable verdi...
Invention Detection of indirect prompt injection attacks with malicious instructions detection models. A m...
Invention Predicting cellular circuit bandwidth based on predicted channel conditions. A system generates ...
Invention Data path failure root cause identification with modified packets. A data path root cause analys...
Invention Visual deep learning for inline phishing detection. Techniques for visual deep learning for inli...
Invention Unstructured data extraction with large language models for query resolution. An unstructured da...
Invention Deep learning in a data plane. Various techniques for deep learning in a data plane are disclose...
Invention Deep learning for in-line detection of malicious command and control traffic from unstructured pa...
Invention Noise addition for differential privacy with preservation of data utility. Noise is added to dat...
Invention Prevention of man-in-the-middle phishing. Techniques for prevention of man-in-the-middle phishin...
Invention Machine learning-based content disarm and reconstruction with web browser prefetching. A web pag...
Invention Anycast addressing and policy-based forwarding configuration for multi-account configurations of ...
Invention Broken object level authorization vulnerability detection. Methods, storage systems and computer...
Invention Policy driven service insertion with middleware for cloud applications. Middleware forwards pack...
2022 G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patt...
G/S Providing information, analytics and statistics about commodities for use in the field of financ...
G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte...
G/S Providing on-line non-downloadable software for data mining, connecting with internet protocol ad...
G/S Promoting best practices and providing consumer information related to cybersecurity threat intel...
G/S Promoting best practices and consumer information related to cybersecurity threat intelligence a...
G/S Providing temporary use of non-downloadable software for autonomous threat detection, collection,...
2021 G/S Monitoring of computer systems for security purposes.
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network route...
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network rout...
G/S Consumer network security devices, namely, firewalls, routers, wifi hotspots, and mesh networks ...
G/S Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ...
2020 G/S Computer hardware, namely, firewalls and network security devices; downloadable computer security...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer softwar...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer software...
G/S Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t...
G/S Downloadable computer software for monitoring, managing and securing computer systems and network...
2019 G/S Computer hardware, namely, firewalls and networks security devices; computer software for compute...
G/S Downloadable computer software for computer network security, namely downloadable computer securi...