|
2025
|
G/S
|
Software as a service (SAAS) services featuring software for protecting cloud computing platforms... |
|
2024
|
Invention
|
Techniques for securing virtual machines.
A system and method for securing virtual cloud assets ... |
|
|
G/S
|
Software as a service (SAAS) services featuring software for
protecting cloud computing platform... |
|
|
Invention
|
Systems and methods for vulnerability remediation based on aggregate risk and shared characterist... |
|
|
Invention
|
Systems and methods of generating automatic suggestions to change infrastructure as code to remed... |
|
|
Invention
|
Systems and methods of agent and agentless collaboration in cloud infrastructure security.
Embod... |
|
2023
|
Invention
|
Techniques for securing virtual machines. A system and method for securing virtual cloud assets i... |
|
|
Invention
|
System and method for a machine-learning adaptive permission reduction engine.
This disclosure d... |
|
|
Invention
|
System and methods for transforming audit logs.
Systems, methods, and non-transitory computer re... |
|
|
Invention
|
Techniques for securing virtual cloud assets at rest against cyber threats.
Systems, methods, an... |
|
|
Invention
|
System and methods for a machine-learning adaptive permission reduction engine. This disclosure d... |
|
2022
|
Invention
|
Techniques for securing virtual machines by application existence analysis. A system and method f... |
|
|
Invention
|
Techniques for securing virtual machines by application use analysis. A system and method for sec... |
|
|
Invention
|
Techniques for securing a plurality of virtual machines in a cloud computing environment. A syste... |
|
|
Invention
|
Techniques for securing virtual machines by analyzing data for cyber threats. A system and method... |
|
|
Invention
|
Hybrid deployment of ephemeral scanners. A cybersecurity scanner deployment system, comprising: a... |
|
|
Invention
|
Foundation of sidescanning. A system for inspecting data, the system comprising: at least one pro... |
|
|
Invention
|
Systems and methods for passive key identification. A method is disclosed for accessing a primary... |
|
|
Invention
|
Forward and rearward facing attack vector visualization. Systems, methods, and computer-readable ... |
|
|
Invention
|
Systems and methods for managing cyber vulnerabilities. Systems, methods, and computer-readable m... |
|
|
Invention
|
Systems and methods for disparate risk information aggregation. Systems, methods, and computer-re... |
|
2021
|
Invention
|
Techniques for securing virtual cloud assets at rest against cyber threats. A method and system f... |
|
|
Invention
|
Virtual machine vulnerabilities and sensitive data analysis and detection. A system and method fo... |
|
2020
|
Invention
|
Techniques for securing virtual cloud assets at rest against cyber threats.
A method and system ... |
|
2019
|
G/S
|
Software as a service (SAAS) services featuring software for protecting cloud computing platform ... |