2025
|
G/S
|
Providing temporary use of online non-downloadable cloud native software application protection p... |
2024
|
Invention
|
Identifying malware based on system api function pointers.
Techniques for identifying malware ba... |
|
Invention
|
Intelligent deployment region selection and scaling of cloud-based firewalls.
Automated, intelli... |
|
Invention
|
Iot security event correlation.
Correlating Internet of Things (IoT) security events is disclose... |
|
Invention
|
Natural language to customize data visualization.
A system, method, and device for generating da... |
|
Invention
|
Security platform with external inline processing of assembled selected traffic.
Techniques for ... |
|
Invention
|
Detecting microsoft windows installer malware using text classification models.
The present appl... |
|
Invention
|
Malicious c&c channel to fixed ip detection using ping packets.
A method for protecting a comput... |
|
Invention
|
Malicious c&c channel to fixed ip detection based on packet volume.
A method for protecting a co... |
|
Invention
|
Suspension and disabling of faulting devices powered through power over ethernet.
Power sourcing... |
|
Invention
|
Supporting zone-based policy enforcement for a firewall connected to a one-arm load balancer.
A ... |
|
Invention
|
Scalable distribution of identity information in overlay networks with identity-based policies.
... |
|
Invention
|
Firewall load balancing with tunnel switching protocols.
An auto scale monitoring service perfor... |
|
Invention
|
Automatic network signature generation.
Automatic generation of network signatures is disclosed.... |
|
Invention
|
Method and system for automatically generating malware signature.
Automatic generation of a malw... |
|
Invention
|
Inline identify and block dangling dns records.
The present application discloses a method, syst... |
|
Invention
|
Dynamic management of packet loss.
Exemplary methods, apparatuses, and systems include duplicati... |
|
Invention
|
Automatically detecting unknown packers.
Techniques for automatically detecting unknown packers ... |
|
Invention
|
Centralized identity redistribution.
Techniques for providing centralized identity redistributio... |
|
Invention
|
Malware analysis through virtual machine forking.
A set of virtual machines (VMs) with different... |
|
Invention
|
Capacity agnostic scoring of network path health based on packet loss.
A network path scoring sy... |
|
Invention
|
Inline malware detection.
Detection of malicious files is disclosed. A firewall uses an external... |
|
Invention
|
Neural dialogue system for security posture management. A neural dialogue system has been designe... |
|
Invention
|
Securely publishing applications from private networks.
A controller can securely publish an app... |
|
Invention
|
Organization-specific cybersecurity dialogue system with large language models. An organization-s... |
|
Invention
|
Intent-based query and response routing between users and backend services. For a seamless and ro... |
|
Invention
|
Single sign-on for remote browsing web app. An architecture has been designed that introduces a "... |
|
Invention
|
Detecting and protecting claimable non-existent domains. Techniques for detecting and protecting ... |
|
G/S
|
Software as a service (SAAS) services featuring software using artificial intelligence for the mo... |
|
G/S
|
Software as a service (SAAS) services featuring software
using artificial intelligence for the m... |
|
Invention
|
Mitigating phishing attempts.
Credential phishing attack mitigation is disclosed. A URL that is ... |
2023
|
Invention
|
Intent-based query and response routing between users and backend services.
For a seamless and r... |
|
Invention
|
Iot policy recommendation large language model (llm) embeddings based global behavior learning. T... |
|
Invention
|
Identity and access management informed attack path discovery.
A resource attack path detector p... |
|
Invention
|
Neural dialogue system for security posture management.
A neural dialogue system has been design... |
|
Invention
|
Organization-specific cybersecurity dialogue system with large language models.
An organization-... |
|
Invention
|
Adversarial training for malicious protocol data unit detection with field value perturbations.
... |
|
Invention
|
Binary file malware detection with structure aware machine learning.
A machine learning ensemble... |
|
Invention
|
Quantum ready intelligent security gateway.
Techniques for applying a quantum ready intelligent ... |
|
Invention
|
Methods to detect malicious stockpiled domain names.
The present application discloses a method,... |
|
Invention
|
Large language model (llm) guided robust learning system design for c2 detection.
Various embodi... |
|
Invention
|
Cloud computer credential theft detection.
Methods, storage systems and computer program product... |
|
Invention
|
Machine learning-based filtering of false positive pattern matches for personally identifiable in... |
|
Invention
|
Iot security knowledge-based chatbot system.
A stateful chatbot system leverages generative AI t... |
|
Invention
|
Advanced threat prevention.
Network traffic (e.g., as monitored by a security appliance on a loc... |
|
Invention
|
Asset security and risk posture visualization.
A system, method, and device for visualizing netw... |
|
Invention
|
Enterprise traffic data correlation for traffic mirroring and decryption.
An orchestrator that m... |
|
Invention
|
Detecting and protecting claimable non-existent domains.
Techniques for detecting and protecting... |
|
Invention
|
Single sign-on for remote browsing web app.
An architecture has been designed that introduces a ... |
|
Invention
|
Scalable flow differentiation for networks with overlapping ip addresses.
Flows corresponding to... |
|
Invention
|
Securely deliver decrypted data of mirrored vpn traffic.
An orchestrator that manages security a... |
2022
|
G/S
|
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and... |
|
G/S
|
Providing information, analytics and statistics about
commodities for use in the field of financ... |
|
G/S
|
Providing on-line non-downloadable software for data mining, connecting with internet protocol ad... |
|
G/S
|
Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ... |
|
G/S
|
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte... |
|
G/S
|
Downloadable software and applications for detecting,
collecting, monitoring, and analyzing patt... |
|
G/S
|
Promoting best practices and providing consumer information related to cybersecurity threat intel... |
|
G/S
|
Promoting best practices and consumer information related to
cybersecurity threat intelligence a... |
|
G/S
|
Providing temporary use of non-downloadable software for autonomous threat detection, collection,... |
2021
|
G/S
|
Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth... |
|
G/S
|
Monitoring of computer systems for security purposes. |
|
G/S
|
Computer hardware, namely, firewalls and networks security devices in the nature of network route... |
|
G/S
|
Computer hardware, namely, firewalls and networks security
devices in the nature of network rout... |
|
G/S
|
Consumer network security devices, namely, firewalls,
routers, wifi hotspots, and mesh networks ... |
|
G/S
|
Providing nondownloadable instructional materials and guidelines in the field of computer softwar... |
|
Invention
|
Identifying malware based on system api function pointers. Techniques for identifying malware bas... |
|
G/S
|
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ... |
2020
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer security... |
|
G/S
|
Computer hardware, namely, firewalls and network security
devices; downloadable computer softwar... |
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer software... |
|
G/S
|
Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t... |
|
G/S
|
Downloadable computer software for monitoring, managing and securing computer systems and network... |
2019
|
G/S
|
Computer hardware, namely, firewalls and networks security devices; computer software for compute... |
|
G/S
|
Downloadable computer software for computer network security, namely downloadable computer securi... |
|
G/S
|
Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits... |
|
G/S
|
Providing a database featuring information, analytics and
statistics about commodities for use i... |
|
G/S
|
downloadable computer software for computer network security technical support services, namely, ... |
|
G/S
|
Technological consultation in the field of computer networking and network security, excluding te... |
2018
|
G/S
|
Providing temporary use of non-downloadable computer software for browsing and accessing computer... |
2017
|
G/S
|
Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malw... |
|
G/S
|
Publication of on-line journals, namely, blogs featuring information related to computer system a... |
|
G/S
|
On-line journals, namely, blogs featuring information in the field of computer system and cloud s... |