Forcepoint Federal Holdings LLC

United States of America

Create a watch for Forcepoint Federal Holdings LLC
Total IP 192
Total IP Rank # 6,857
IP Activity Score 2.9/5.0    99
IP Activity Rank # 6,873
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

187 5
0 0
0 0
0
 
Last Patent 2025 - Security analytics system for pe...
First Patent 1998 - Method and system for monitoring...
Last Trademark 2020 - DYNAMIC DATA PROTECTION
First Trademark 2006 - THREATSEEKER

Industry (Nice Classification)

Latest Inventions, Goods, Services

2025 Invention Security analytics system for performing a non-sanctioned entity interaction analysis operation w...
2021 Invention Web endpoint device having automatic switching between proxied and non-proxied communication mode...
Invention Cloud-based explicit proxy with private access feature set. A system for processing data is discl...
Invention System and method for managing system configuration data models. A system, for managing applicati...
2020 Invention Associating a security risk persona with a phase of a cyber kill chain. A system, method, and com...
Invention Generating a security risk persona using stressor data. A system, method, and computer-readable m...
Invention Using an entity behavior catalog when performing human-centric risk modeling operations. A system...
Invention Using a behavior-based modifier when generating a user entity risk score. A system, method, and c...
Invention Correlating concerning behavior during an activity session with a security risk persona. A system...
Invention User behavior profile including temporal detail corresponding to user interaction. A system, meth...
Invention Using a story when generating inferences using an adaptive trust profile. A system, method, and c...
Invention Human factors framework. A system, method, and computer-readable medium are disclosed for perform...
Invention Using indicators of behavior to identify a security persona of an entity. A system, method, and c...
Invention Using human factors when performing a human factor risk operation. A system, method, and computer...
Invention Using indicators of behavior when performing a security operation. A system, method, and computer...
Invention Analyzing an event enacted by a data entity when performing a security operation. A system, metho...
Invention System and method for efficient fingerprinting in cloud multitenant data loss prevention. A data ...
Invention Cloud-based explicit proxy. A system for processing data, comprising a first processor configured...
Invention Risk-adaptive dns forwarder. A method, system, and computer-usable medium are disclosed for: (i)...
Invention Double-layered image classification endpoint solution. A system for image classification is discl...
Invention Anomaly detection using endpoint counters. A system, method, and computer-readable medium are dis...
Invention Cybersecurity system having security policy visualization. A system, method, and computer-readabl...
Invention Method, system, and apparatus for probabilistic identification of encrypted files. A mechanism fo...
Invention Progressive trigger data and detection model. A system, method, and computer-readable medium are ...
Invention Cybersecurity system having digital certificate reputation system. A system, method, and computer...
Invention Shared pipeline for multiple services. A processor-implemented method for a continuous deployment...
Invention System and method for creating buffered firewall logs for reporting. A system for firewall data l...
Invention Human-centric risk modeling framework. A system, method, and computer-readable medium are disclos...
Invention Using concerning behaviors when performing entity-based risk calculations. A system, method, and ...
Invention Anticipating future behavior using kill chains. A system, method, and computer-readable medium ar...
G/S Computer hardware; downloadable computer software, namely, downloadable software for the creation...
G/S Providing computer software services, namely, web, hardware, network, computer and internet secur...
Invention Containerized infrastructure for deployment of microservices. A method, system and computer-usabl...
Invention Security analytics system configured to instantiate user behavior baselines using historical data...
Invention Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology. A sys...
Invention Entity behavior catalog architecture. A system, method, and computer-readable medium are disclose...
Invention Defining groups of behaviors for storage within an entity behavior catalog. A system, method, and...
Invention Inferring a scenario when performing a security operation using an entity behavior catalog. A sys...
Invention Disrupting a cyber kill chain when performing security operations. A system, method, and computer...
Invention Determining an abstraction level for contents of an entity behavior catalog. A system, method, a...
Invention Representing sets of behaviors within an entity behavior catalog. A system, method, and computer-...
Invention Using an entity behavior catalog when performing security operations. A system, method, and compu...
Invention External trigger induced behavioral analyses. A mechanism is provided for using triggered stimuli...
Invention Identification of unknown traffic based on transport layer security extensions. A system for prov...
Invention Automated renewal of certificates across a distributed computing security system. A system for da...
Invention Gui assisted infrastructure as code. A system for network configuration, comprising a graphic use...
2019 Invention Endpoint context agent traversal of network address table. A method, system, and computer-usable ...
Invention Encrypted server name indication inspection. A method, system, and computer-usable medium are dis...
Invention System and method for service aliasing and pooled load balancing. A system for controlling a net...
Invention Resilient tunnels. A system for controlling data services, comprising a plurality of host compute...
Invention Managing data schema differences by path deterministic finite automata. A method for migrating a ...
Invention Dynamic injection or modification of headers to provide intelligence. A method, system, and compu...
2006 G/S COMPUTER SOFTWARE FOR WEB, HARDWARE, NETWORK, COMPUTER AND INTERNET SECURITY