|
2025
|
G/S
|
Downloadable computer software for computer network
security; downloadable computer software for... |
|
|
G/S
|
Computer hardware; Downloadable security software for sharing and storing sensitive information o... |
|
|
G/S
|
Downloadable computer software for an enterprise browser for secure web browsing, internet access... |
|
|
G/S
|
Downloadable computer software for computer network security protection; Downloadable computer so... |
|
|
G/S
|
platform as a service (PAAS) featuring computer software platforms for managing unified data in t... |
|
|
G/S
|
Platform as a service (PAAS) featuring computer software platforms for managing unified data in t... |
|
|
Invention
|
Adversarial training for malicious protocol data unit detection with field value perturbations.
... |
|
|
Invention
|
Iot adaptive threat prevention.
IoT adaptive threat prevention is disclosed. Network traffic rec... |
|
|
Invention
|
Machine learning architecture for detecting malicious files using stream of data.
The present ap... |
|
|
Invention
|
Inline inspection cybersecurity enforcement of multipart file transmissions.
Separating awarenes... |
|
|
G/S
|
Downloadable computer software for computer network security; Downloadable computer software for ... |
|
|
Invention
|
Deploying symmetric routing.
Techniques for deploying symmetric routing are disclosed. A system,... |
|
|
Invention
|
Security policy enforcement and visibility for network traffic with masked source addresses.
Som... |
|
|
Invention
|
Securely deliver decrypted data of mirrored vpn traffic.
An orchestrator that manages security a... |
|
|
Invention
|
Malware detection for documents using knowledge distillation assisted learning.
The detection of... |
|
|
G/S
|
Providing temporary use of online non-downloadable cloud native software application protection p... |
|
|
G/S
|
Providing temporary use of online non-downloadable cloud
native software application protection ... |
|
|
Invention
|
Sd-wan iot security posture management.
Increasing use of web-based applications or Software-as-... |
|
|
Invention
|
High availability of cloud-based services with address translation.
Described herein are systems... |
|
|
Invention
|
Multiple data center compatible deployment of applications matching a wildcard domain name.
A ne... |
|
|
G/S
|
Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth... |
|
|
Invention
|
Network attack detection with targeted feature extraction from exploit tools.
The present applic... |
|
|
Invention
|
Selective intelligent enforcement in mobile networks.
In some embodiments, a system/process/comp... |
|
|
Invention
|
Inline ransomware detection via server message block (smb) traffic.
Inline detection of ransomwa... |
|
|
Invention
|
Strategically aged domain detection.
Detection of strategically aged domains is detected. A set ... |
|
|
G/S
|
Downloadable computer software for use as a security platform with security operations capabiliti... |
|
|
G/S
|
Downloadable computer software for computer network security; downloadable computer software for ... |
|
|
Invention
|
Secure access service edge for mobile networks. Techniques for providing security for providing S... |
|
|
Invention
|
Service access service edge solution for providing enhanced security for unmanaged devices for mo... |
|
|
Invention
|
Service access service edge solution for providing enhanced security for mobile networks. Techniq... |
|
|
Invention
|
Explicit proxy solutions for 5g security with service access service edge (sase) with service pro... |
|
|
Invention
|
Zero trust network access solution for 5g sase with explicit proxy. In some embodiments, a system... |
|
|
Invention
|
Visual deep learning for inline phishing detection. Techniques for visual deep learning for inlin... |
|
|
Invention
|
Deep learning in a data plane. Various techniques for deep learning in a data plane are disclosed... |
|
|
Invention
|
Preventing edr termination using vulnerable drivers. Methods, storage systems and computer progra... |
|
2024
|
Invention
|
Contextual identifier-attribute mappings for large language models. A contextual natural language... |
|
|
Invention
|
Modifying a user query to prevent hallucinations. A user query that includes a natural language d... |
|
|
Invention
|
Service access service edge solution for providing enhanced security for mobile networks.
Techni... |
|
|
Invention
|
Ai-enabled device ownership identification for securing nationwide critical infrastructure system... |
|
|
Invention
|
Viscad: visual-guided campaign auto-discovery.
The present application discloses a method, syste... |
|
|
Invention
|
Auto-tagging of sanctioned saas applications.
A system has been created to automatically identif... |
|
|
Invention
|
Structuring ipv6 addresses into bit fields to embed language localization and services.
Techniqu... |
|
|
Invention
|
Securing embedded link access in emails using isolation context.
The present application disclos... |
|
|
Invention
|
Robust long-term resource usage forecasting and multi-trend classification.
The present applicat... |
|
|
Invention
|
Ml based domain risk scoring and its applications to advanced url filtering.
The present applica... |
|
|
G/S
|
Software as a service (SAAS) services featuring software using artificial intelligence for the mo... |
|
|
G/S
|
Software as a service (SAAS) services featuring software
using artificial intelligence for the m... |
|
|
Invention
|
Cve labeling for exploits using proof-of-concept and llm.
The disclosed system determines a CVE ... |
|
|
Invention
|
Knowledge base and interface for efficient response to user queries.
A knowledge base is built, ... |
|
|
Invention
|
Maintaining stable uniform resource locator verdicts with intelligent recrawling.
A stable verdi... |
|
|
Invention
|
Detection of indirect prompt injection attacks with malicious instructions detection models.
A m... |
|
|
Invention
|
Predicting cellular circuit bandwidth based on predicted channel conditions.
A system generates ... |
|
|
Invention
|
Data path failure root cause identification with modified packets.
A data path root cause analys... |
|
|
Invention
|
Visual deep learning for inline phishing detection.
Techniques for visual deep learning for inli... |
|
|
Invention
|
Unstructured data extraction with large language models for query resolution.
An unstructured da... |
|
|
Invention
|
Deep learning in a data plane.
Various techniques for deep learning in a data plane are disclose... |
|
|
Invention
|
Deep learning for in-line detection of malicious command and control traffic from unstructured pa... |
|
|
Invention
|
Noise addition for differential privacy with preservation of data utility.
Noise is added to dat... |
|
|
Invention
|
Prevention of man-in-the-middle phishing.
Techniques for prevention of man-in-the-middle phishin... |
|
|
Invention
|
Machine learning-based content disarm and reconstruction with web browser prefetching.
A web pag... |
|
|
Invention
|
Anycast addressing and policy-based forwarding configuration for multi-account configurations of ... |
|
|
Invention
|
Broken object level authorization vulnerability detection.
Methods, storage systems and computer... |
|
|
Invention
|
Policy driven service insertion with middleware for cloud applications.
Middleware forwards pack... |
|
2022
|
G/S
|
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and... |
|
|
G/S
|
Downloadable software and applications for detecting,
collecting, monitoring, and analyzing patt... |
|
|
G/S
|
Providing information, analytics and statistics about
commodities for use in the field of financ... |
|
|
G/S
|
Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ... |
|
|
G/S
|
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte... |
|
|
G/S
|
Providing on-line non-downloadable software for data mining, connecting with internet protocol ad... |
|
|
G/S
|
Promoting best practices and providing consumer information related to cybersecurity threat intel... |
|
|
G/S
|
Promoting best practices and consumer information related to
cybersecurity threat intelligence a... |
|
|
G/S
|
Providing temporary use of non-downloadable software for autonomous threat detection, collection,... |
|
2021
|
G/S
|
Monitoring of computer systems for security purposes. |
|
|
G/S
|
Computer hardware, namely, firewalls and networks security devices in the nature of network route... |
|
|
G/S
|
Computer hardware, namely, firewalls and networks security
devices in the nature of network rout... |
|
|
G/S
|
Consumer network security devices, namely, firewalls,
routers, wifi hotspots, and mesh networks ... |
|
|
G/S
|
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ... |
|
2020
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer security... |
|
|
G/S
|
Computer hardware, namely, firewalls and network security
devices; downloadable computer softwar... |
|
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer software... |
|
|
G/S
|
Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t... |
|
|
G/S
|
Downloadable computer software for monitoring, managing and securing computer systems and network... |
|
2019
|
G/S
|
Computer hardware, namely, firewalls and networks security devices; computer software for compute... |
|
|
G/S
|
Downloadable computer software for computer network security, namely downloadable computer securi... |