2024
|
Invention
|
Machine learning system and method for network security improvement.
A system and method for aut... |
|
Invention
|
Data set and algorithm validation, bias characterization, and valuation.
A system and method for... |
|
Invention
|
Privilege assurance of enterprise computer network environments using lateral movement detection ... |
|
Invention
|
Privilege assurance of enterprise computer network environments using attack path detection and p... |
|
Invention
|
Correlating network event anomalies using active and passive external reconnaissance to identify ... |
|
Invention
|
Contextual and risk-based multi-factor authentication. A system for contextual and risk-based mul... |
|
Invention
|
Highly scalable four-dimensional geospatial data system for simulated worlds.
A system and metho... |
|
Invention
|
Parametric analysis of integrated operational and information technology systems.
A system and m... |
|
Invention
|
Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissanc... |
|
Invention
|
Ongoing trigger-based scanning of cyber-physical assets.
A system and method for trigger-based s... |
|
Invention
|
System and method for track and trace user and entity behavior analysis. A system and method for ... |
|
Invention
|
System and method for attacker interdiction using track and trace user and entity behavior analys... |
|
Invention
|
System and method for enterprise-wide data utilization tracking and risk reporting. A system and ... |
|
Invention
|
System and method for cyber exploitation path analysis and response using federated networks. A s... |
|
Invention
|
Composite symbolic and non-symbolic artificial intelligence system for advanced reasoning and sem... |
|
Invention
|
Rapid predictive analysis of very large data sets using the distributed computational graph. A sy... |
|
Invention
|
Rapid predictive analysis of very large data sets using the distributed computational graph. A di... |
|
Invention
|
A system and method for cyber exploitation path analysis and task plan optimization. A system and... |
|
Invention
|
Kerberos interdiction and decryption for real-time analysis. A system and methods for Kerberos pr... |
|
Invention
|
Collaborative cloud identity and credential forgery and abuse defense. A system and method for pr... |
|
Invention
|
High-performance, dynamically specifiable knowledge graph system and methods.
A system for dynam... |
|
Invention
|
Automated internet-scale web application vulnerability scanning and enhanced security profiling. ... |
|
Invention
|
Privilege assurance using logon session tracking and logging.
A system and method for the preven... |
|
Invention
|
Ai-enhanced simulation and modeling experimentation and control.
An artificial intelligence-driv... |
|
Invention
|
System and method for internet activity and health forecasting and internet noise analysis. A sys... |
|
Invention
|
Dynamic authentication attack detection and enforcement at network, application, and host level. ... |
|
Invention
|
Dynamic authentication revocation utilizing privilege assurance. A system and method for the dyna... |
|
Invention
|
Network authentication toxicity assessment. A system and method for scoring and enforcing authent... |
|
Invention
|
Detecting authentication object-focused attacks.
A system and methods for detecting and mitigati... |
|
Invention
|
Detecting and mitigating forged authentication attacks within a domain.
A system for detecting a... |
|
Invention
|
Fingerprint-based network mapping of cyber-physical assets.
A system and method for fingerprint-... |
|
Invention
|
Self-adjusting cybersecurity analysis and score generation. A reconnaissance engine gathers data ... |
|
Invention
|
Self-adjusting cybersecurity analysis with network mapping.
A system and method for self-adjusti... |
|
Invention
|
Automatically computing and improving a cybersecurity risk score.
Automatically computing and ma... |
|
Invention
|
System and method for self-adjusting cybersecurity analysis and score generation.
A reconnaissan... |
|
Invention
|
Regulation-based electronic message routing.
A system for regulation-based electronic message ro... |
|
Invention
|
Ai-driven defensive cybersecurity strategy analysis and recommendation system. A system and metho... |
2023
|
Invention
|
Host - level ticket forgery detection and extension to network endpoints.
A system and method fo... |
|
Invention
|
System and method for track and trace user and entity behavior analysis.
A system and method for... |
|
Invention
|
System and method for enterprise - wide data utilization tracking and risk reporting.
A system a... |
|
Invention
|
Collaborative cloud identity and credential forgery and abuse defense.
A system and method for p... |
|
Invention
|
Kerberos interdiction and decryption for real-time analysis.
A system and methods for Kerberos p... |
|
Invention
|
Dynamic cyberattack mission planning and analysis.
A system and method for cybersecurity mission... |
|
Invention
|
Dynamic authentication revocation utilizing privilege assurance.
A system and method for the dyn... |
2021
|
G/S
|
Platform as a service (PAAS) featuring computer software platforms for creating searchable databa... |
|
G/S
|
Providing temporary use of online, non-downloadable software for Internet topography measurement,... |
|
G/S
|
Software-as-a-service (SAAS) services featuring software for cybersecurity, namely, monitoring an... |
|
G/S
|
Cybersecurity services in the nature of testing networked computer systems for external vulnerabi... |
2020
|
G/S
|
Business collaboration services, namely, providing a networking web site for collaboration, devel... |
|
G/S
|
Providing software-as-a-service (SAAS) services featuring software for business analytics, busine... |
2019
|
G/S
|
Software-as-a-service (SAAS) services featuring software for business analytics, operational risk... |
|
G/S
|
Software-as-a-service (SAAS) services featuring software for insurance risk quantification and mi... |
|
G/S
|
software-as-a-service (SAAS) services featuring software for business analytics, risk quantificat... |
|
G/S
|
Software-as-a-service (SAAS) services featuring software for cybersecurity monitoring and control... |
|
G/S
|
Providing software-as-a-service featuring software for business analytics, business optimization ... |
|
G/S
|
Software-as-a-service (SAAS) services featuring software for financial analysis, real-time financ... |
|
G/S
|
Providing temporary use of on-line non-downloadable cloud computing software-as-a-service for cyb... |
2017
|
G/S
|
Providing software as a service (SaaS) services featuring software for cybersecurity monitoring a... |
|
G/S
|
Providing temporary use of on-line non-downloadable cloud computing software-as-a-service for mon... |