2023
|
Invention
|
System and method for dns tunneling protection.
Embodiments of systems and methods for DNS leak ... |
2022
|
Invention
|
Security event transformation and logging systems and methods.
Embodiments provide systems and m... |
2021
|
Invention
|
System and method for leak prevention for domain name system requests. Embodiments of systems and... |
2020
|
G/S
|
Downloadable software for providing access to a cloud computing system for protecting and securin... |
2017
|
Invention
|
Contextual security training.
Examples of the present disclosure describe systems and methods fo... |
|
Invention
|
Dynamic sensors. Examples of the present disclosure describe systems and methods for generating d... |
|
Invention
|
Automatic inline detection based on static data. Examples of the present disclosure describe syst... |
2016
|
Invention
|
Real-time scanning of ip addresses. Examples of the present disclosure describe systems and metho... |
|
Invention
|
Binocular fusion analytics security. Examples of the present disclosure describe systems and meth... |
|
Invention
|
Automatic threat detection of executable files based on static data analysis. Aspects of the pres... |
2015
|
G/S
|
Downloadable software to provide access to a cloud computing system for protecting and securing t... |
|
G/S
|
Downloadable software, namely, providing access to a cloud
computing system for protecting and s... |
|
G/S
|
Downloadable software, namely, for providing access to a cloud computing system for protecting an... |
|
G/S
|
Providing access to computer networks over telecommunications networks; providing access between ... |
|
Invention
|
Network threat prediction and blocking. A firewall monitors network activity and stores informati... |
|
Invention
|
Smart caching based on reputation information. Embodiments disclosed herein relate to systems and... |
|
Invention
|
Detecting and preventing execution of software exploits. In non-limiting examples, anti-exploit s... |
2014
|
Invention
|
Methods and apparatus for agent-based malware management.
Methods and apparatus for providing pr... |
|
Invention
|
Method and apparatus for providing forensic visibility into systems and networks. Methods and sys... |
|
Invention
|
Managed execution and expiration of agent commands. Methods and apparatus for managing the expira... |
2013
|
G/S
|
Computer security services, namely, restricting access to and from undesired computers, networks ... |
|
G/S
|
Software for protecting and securing the integrity of computing devices, mobile phones and networ... |
|
Invention
|
System and method to provide automatic classification of phishing sites. A phishing classificatio... |
2012
|
Invention
|
Methods and apparatus for dealing with malware. In one aspect, a method of classifying a co... |
|
G/S
|
Computer software for protecting and securing the integrity of computing devices and network syst... |
|
G/S
|
Providing temporary use of on-line non-downloadable software for protecting and securing the inte... |
2011
|
G/S
|
providing temporary use of on-line non-downloadable software for protecting and securing the inte... |
|
G/S
|
computer software for protecting and securing the integrity of computing devices and network systems |
2010
|
Invention
|
Concurrent and delayed processing of malware with reduced i/o interference. Systems, methods and ... |
2009
|
G/S
|
Computer services, namely web filtering services. |
|
G/S
|
Computer services, namely, web filtering services |
2008
|
G/S
|
Business services, namely, distributorship services in the field of computer software, telephone ... |
2007
|
G/S
|
Computer software for monitoring the activities of a
computer user, preventing the execution of ... |
2006
|
Invention
|
Method and system for detecting a compressed pestware executable object.
A method and system for... |
|
Invention
|
Method and system for denying pestware direct drive access.
A method and system for denying pest... |
|
Invention
|
System and method for obtaining file information and data locations.
A system and method for gat... |
2005
|
G/S
|
Computer software for use in protecting the privacy and security of personal computers, namely en... |
|
G/S
|
Computer software, namely computer software for providing security features to detect, identify, ... |
|
G/S
|
Computer software, namely, computer software for providing
security features to detect, identify... |
|
G/S
|
Computer software for use in protecting the privacy and
security of personal computers, namely e... |
2004
|
Invention
|
System and method for monitoring network communications for pestware.
Methods for monitoring net... |
|
G/S
|
Computer software that detects, identifies, analyzes, manages, blocks and/or removes other comput... |