2025
|
Invention
|
Security analytics system for performing a non-sanctioned entity interaction analysis operation w... |
2021
|
Invention
|
Web endpoint device having automatic switching between proxied and non-proxied communication mode... |
|
Invention
|
Cloud-based explicit proxy with private access feature set. A system for processing data is discl... |
|
Invention
|
System and method for managing system configuration data models. A system, for managing applicati... |
2020
|
Invention
|
Associating a security risk persona with a phase of a cyber kill chain. A system, method, and com... |
|
Invention
|
Generating a security risk persona using stressor data. A system, method, and computer-readable m... |
|
Invention
|
Using an entity behavior catalog when performing human-centric risk modeling operations. A system... |
|
Invention
|
Using a behavior-based modifier when generating a user entity risk score. A system, method, and c... |
|
Invention
|
Correlating concerning behavior during an activity session with a security risk persona. A system... |
|
Invention
|
User behavior profile including temporal detail corresponding to user interaction. A system, meth... |
|
Invention
|
Using a story when generating inferences using an adaptive trust profile. A system, method, and c... |
|
Invention
|
Human factors framework. A system, method, and computer-readable medium are disclosed for perform... |
|
Invention
|
Using indicators of behavior to identify a security persona of an entity. A system, method, and c... |
|
Invention
|
Using human factors when performing a human factor risk operation. A system, method, and computer... |
|
Invention
|
Using indicators of behavior when performing a security operation. A system, method, and computer... |
|
Invention
|
Analyzing an event enacted by a data entity when performing a security operation. A system, metho... |
|
Invention
|
System and method for efficient fingerprinting in cloud multitenant data loss prevention. A data ... |
|
Invention
|
Cloud-based explicit proxy. A system for processing data, comprising a first processor configured... |
|
Invention
|
Risk-adaptive dns forwarder.
A method, system, and computer-usable medium are disclosed for: (i)... |
|
Invention
|
Double-layered image classification endpoint solution. A system for image classification is discl... |
|
Invention
|
Anomaly detection using endpoint counters. A system, method, and computer-readable medium are dis... |
|
Invention
|
Cybersecurity system having security policy visualization. A system, method, and computer-readabl... |
|
Invention
|
Method, system, and apparatus for probabilistic identification of encrypted files. A mechanism fo... |
|
Invention
|
Progressive trigger data and detection model. A system, method, and computer-readable medium are ... |
|
Invention
|
Cybersecurity system having digital certificate reputation system. A system, method, and computer... |
|
Invention
|
Shared pipeline for multiple services. A processor-implemented method for a continuous deployment... |
|
Invention
|
System and method for creating buffered firewall logs for reporting. A system for firewall data l... |
|
Invention
|
Human-centric risk modeling framework. A system, method, and computer-readable medium are disclos... |
|
Invention
|
Using concerning behaviors when performing entity-based risk calculations. A system, method, and ... |
|
Invention
|
Anticipating future behavior using kill chains. A system, method, and computer-readable medium ar... |
|
G/S
|
Computer hardware; downloadable computer software, namely, downloadable software for the creation... |
|
G/S
|
Providing computer software services, namely, web, hardware, network, computer and internet secur... |
|
Invention
|
Containerized infrastructure for deployment of microservices. A method, system and computer-usabl... |
|
Invention
|
Security analytics system configured to instantiate user behavior baselines using historical data... |
|
Invention
|
Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology. A sys... |
|
Invention
|
Entity behavior catalog architecture. A system, method, and computer-readable medium are disclose... |
|
Invention
|
Defining groups of behaviors for storage within an entity behavior catalog. A system, method, and... |
|
Invention
|
Inferring a scenario when performing a security operation using an entity behavior catalog. A sys... |
|
Invention
|
Disrupting a cyber kill chain when performing security operations. A system, method, and computer... |
|
Invention
|
Determining an abstraction level for contents of an entity behavior catalog.
A system, method, a... |
|
Invention
|
Representing sets of behaviors within an entity behavior catalog. A system, method, and computer-... |
|
Invention
|
Using an entity behavior catalog when performing security operations. A system, method, and compu... |
|
Invention
|
External trigger induced behavioral analyses. A mechanism is provided for using triggered stimuli... |
|
Invention
|
Identification of unknown traffic based on transport layer security extensions. A system for prov... |
|
Invention
|
Automated renewal of certificates across a distributed computing security system. A system for da... |
|
Invention
|
Gui assisted infrastructure as code. A system for network configuration, comprising a graphic use... |
2019
|
Invention
|
Endpoint context agent traversal of network address table. A method, system, and computer-usable ... |
|
Invention
|
Encrypted server name indication inspection. A method, system, and computer-usable medium are dis... |
|
Invention
|
System and method for service aliasing and pooled load balancing.
A system for controlling a net... |
|
Invention
|
Resilient tunnels. A system for controlling data services, comprising a plurality of host compute... |
|
Invention
|
Managing data schema differences by path deterministic finite automata. A method for migrating a ... |
|
Invention
|
Dynamic injection or modification of headers to provide intelligence. A method, system, and compu... |
2006
|
G/S
|
COMPUTER SOFTWARE FOR WEB, HARDWARE, NETWORK, COMPUTER AND INTERNET SECURITY |