2025
|
G/S
|
Computer hardware; Computer switches; Ethernet switches; Electrical switches; Telecommunication s... |
|
Invention
|
Enhancing insider attack detection via image classification with non-dynamic information.
System... |
|
Invention
|
Adding device trust to generate a stronger notion of request origination.
Approaches to electron... |
|
Invention
|
Fast gap reduction in policy tree creation for policy set with uneven density.
A policy tree of ... |
|
Invention
|
Intelligent wi-fi 6ghz access point associations using reduced neighbor report announcements.
Re... |
|
Invention
|
Systems and methods for generating synthetic data representing insider attacks.
Systems, methods... |
|
Invention
|
Systems and methods for fine grained forward testing for a ztna environment.
Systems, devices, a... |
|
Invention
|
Vulnerability remediation recommendation mechanism.
A method is disclosed. The method comprises ... |
|
Invention
|
Network security device with integrated display.
Systems and methods for conveying operating sta... |
|
Invention
|
Assessment of raised security events at an application.
Systems and methods for assessment of ra... |
|
Invention
|
Determination of user operations at a data processing system.
Methods are described for determin... |
|
Invention
|
Active vulnerability detection for a compute environment.
Improved vulnerability detection in a ... |
2024
|
Invention
|
Guiding query creation for a generative artificial intelligence (ai)-enabled assistant. Guiding q... |
|
Invention
|
Training trusted users of an enterprise network for phishing attacks on a per-user basis.
A user... |
|
Invention
|
Threat-informed adversary attack simulation.
A dynamic adversary profile is generated for a simu... |
|
Invention
|
Authentication of device configurations for authenticated devices.
Validation of a firmware imag... |
|
Invention
|
Asset crawling with internet archives for enhanced web application scanning.
A scan request for ... |
|
Invention
|
Automatic network error routing for downstream network hop errors.
A routing table of a network ... |
|
Invention
|
Software-defined wide area networking (sd-wan) customer equipment (ce) node traffic steering with... |
|
Invention
|
Systems and methods to safely provide files and software updates with a cloud subscription servic... |
|
Invention
|
Malicious document prevention mechanism.
A system is disclosed. The system includes at least one... |
|
Invention
|
Customizable generative artificial intelligence (‘ai’) assistant. Providing a customizable genera... |
2023
|
Invention
|
Automotive security configuration management.
A request to check for updated configuration files... |
|
Invention
|
Path selection strategy utilizing type of service (tos) in software-defined wide area network (sd... |
|
Invention
|
Transparent proxy mode authentication in dns ddos mitigation.
A UDP DNS query from a client, and... |
|
Invention
|
Federated abnormal process detection for kubernetes clusters.
No abstract |
|
Invention
|
Management of wireless and wired multicast traffic.
Stations are monitored that join and leave a... |
|
Invention
|
Validation engine for firewall migration.
Log data is gathered from the first firewall. The log ... |
|
Invention
|
Insider threat reporting mechanism.
A system is disclosed. The system includes at least one phys... |
|
Invention
|
Zero-trust network access (ztna) secure traffic forwarding.
Systems and methods for performing Z... |
|
Invention
|
Proactively assist roaming of wi-fi 6e stations with smart-management of fast bss transition.
A ... |
|
Invention
|
Disrupting connections between rogue access points and rogue stations with spoofed bss transition... |
|
Invention
|
Using a logical graph to monitor an environment. A data platform receives data associated with ac... |
|
Invention
|
Virtual data streams in a data streaming platform. An example method includes receiving, by a dat... |
|
Invention
|
Modular agentless scanning of cloud workloads. An illustrative method includes a scanning driver ... |
|
Invention
|
Gathering and presenting information related to common vulnerabilities and exposures. Gathering a... |
|
Invention
|
Attack path risk mitigation by a data platform. An illustrative method includes scanning a comput... |
|
Invention
|
Monitoring communications in a containerized environment. In some embodiments, a data platform re... |
|
Invention
|
Guided interactions with a natural language interface. Guided interactions with a natural languag... |
|
Invention
|
Using natural language queries to conduct an investigation of a monitored system. Using natural l... |
|
Invention
|
Composite events indicative of multifaceted security threats within a compute environment. Data p... |
|
Invention
|
Runtime workload data-based modification of permissions for an entity. An illustrative method inc... |
|
Invention
|
Transitive identity usage tracking by a data platform. An illustrative method includes tracking, ... |
|
Invention
|
Unified storage for event streams in an anomaly detection framework. Providing unified storage fo... |
2022
|
G/S
|
Software as a service (SAAS) services, featuring software for use in providing cybersecurity moni... |
|
Invention
|
Activity monitoring of a cloud compute environment based on container orchestration data. Activit... |
|
Invention
|
Operational adjustment for an agent collecting data from a cloud compute environment monitored by... |
|
Invention
|
Tracking infrastructure as code (iac) asset lifecycles. Monitoring tracking infrastructure as cod... |
|
Invention
|
Interdependence of agentless and agent-based operations by way of a data platform. An illustrativ... |
|
G/S
|
data processing equipment, namely, computers, computer network routers, wireless routers and emb... |
|
Invention
|
Container event monitoring using kernel space communication. Example systems and methods monitor ... |
|
Invention
|
Community-based generation of policies for a data platform. A disclosed data platform may be conf... |
|
Invention
|
Container vulnerability management by a data platform. An illustrative method includes accessing,... |
2021
|
G/S
|
Operating system programs; computer operating programs and computer operating systems; computer s... |
|
G/S
|
Computer hardware; data processors; data processing equipment, namely, content processors; networ... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Computer hardw... |
|
G/S
|
Computer hardware; computer hardware, namely, wireless access point (WAP) devices; LAN (local are... |
|
G/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; LAN (local are... |
2018
|
G/S
|
Computer network gateway hardware and software for enabling
computer gateway services, namely, f... |
|
G/S
|
Computer consulting services; computer software and network
security research and development se... |
|
G/S
|
Operating system programs; Computer operating programs and computer operating systems; computer s... |
2017
|
G/S
|
Information technology consulting services; Computer software consulting; Computer consultation i... |
2015
|
G/S
|
Computer hardware; computer switches; Ethernet switches; Automatic transfer switches (ATS); compu... |
2014
|
G/S
|
computer services, namely, cloud hosting provider services; consulting services in the field of c... |
|
G/S
|
Providing return merchandise authorization services, namely, management of returned merchandise a... |
|
G/S
|
Electronic software updates, namely, downloadable computer software and associated data files for... |
|
G/S
|
Computer hardware; wide area and local area computer network hardware, firmware and software, for... |
|
G/S
|
Monitoring of computer systems for security purposes; consulting services in the field of maintai... |
|
G/S
|
Data processing equipment; computer hardware; network hardware; network gateway hardware; softwar... |
2010
|
G/S
|
Computer network operating system featuring network
security, network management, processing of ... |
|
G/S
|
Computer consulting services, namely, computer software,
hardware, firmware, and network consult... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software, for managin... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for monitori... |
|
G/S
|
Electronic software updates, namely, downloadable computer
software and associated data files fo... |
|
G/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for promotin... |
2008
|
G/S
|
Computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for monitorin... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software for promoting... |
|
G/S
|
Computer hardware; wide area and local area network hardware, firmware and software, for managing... |
|
G/S
|
Computer software for protecting computer systems and mobile devices to promote network efficienc... |
2007
|
G/S
|
Computer hardware; network hardware; network gateway hardware; computer software; downloadable co... |
|
G/S
|
Computer hardware; network hardware; computer software; downloadable computer software; firmware;... |
2004
|
G/S
|
Hosting the websites on a computer server for a global computer network |
|
G/S
|
Computer hardware namely Computer Network Gateway. Network Security Consulting. |
|
G/S
|
Computer hardware namely Computer Network gateway. Network Security Consulting. |
2001
|
G/S
|
computer network operating system featuring network security, network management, processing of n... |
|
G/S
|
computer network gateway hardware and software for enabling computer gateway services, namely, fo... |