2025
|
P/S
|
Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth... |
|
P/S
|
Downloadable computer software for computer network security; downloadable computer software for ... |
|
P/S
|
Software as a service (SAAS) services featuring software for use in computer network security; so... |
|
Invention
|
Secure browser synchronization across browser instances.
A communications system for providing s... |
|
Invention
|
Combined machine learning and formal techniques for network traffic analysis.
A system generates... |
|
Invention
|
Iot application learning.
A system and method for performing automated learning of an Internet-o... |
|
Invention
|
Multi-model based account/product sequence recommender.
To automatically identify a sequence of ... |
|
Invention
|
Auto generating build time policies from run time policies for shift left security.
Comprehensiv... |
|
Invention
|
Iot policy recommendation large language model (llm) embeddings based global behavior learning.
... |
|
Invention
|
Distributed traffic steering and enforcement for security solutions.
In some embodiments, a syst... |
|
Invention
|
Providing identity protection.
Techniques for providing identity protection are disclosed. A sys... |
|
Invention
|
Application identification for phishing detection.
Techniques for application identification for... |
|
Invention
|
Probing for cobalt strike teamserver detection.
Techniques for probing for Cobalt Strike TeamSer... |
|
Invention
|
Flow metadata exchanges between network and security functions for a security service.
In some e... |
|
Invention
|
Application precedence based traffic policy enforcement.
Assigning priority values to applicatio... |
|
Invention
|
Context-based security in mobile networks using an api and a data store.
Techniques for applying... |
|
Invention
|
Remote attack surface discovery and management.
Techniques for identifying and managing an organ... |
|
Invention
|
Unified parked domain detection system.
The present application discloses a method, system, and ... |
|
P/S
|
Providing temporary use of online non-downloadable cloud native software application protection p... |
2024
|
Invention
|
Identifying devices with multiple network interface cards in a network.
A service obtains traffi... |
|
Invention
|
Detection of replacement/copy-paste attacks through monitoring and classifying api function invoc... |
|
Invention
|
Cross protocol malware traffic detection using a two-layer ml architecture. A system, method, and... |
|
Invention
|
Threat intelligence dialogue system for interfacing with a proprietary threat intelligence databa... |
|
Invention
|
Multiple data center compatible deployment of applications matching a wildcard domain name. A net... |
|
Invention
|
Configuring application availability using anycast addressing. Anycast addressing is utilized to ... |
|
Invention
|
Automated code signature generation for windows.net binaries. Various embodiments provide a syste... |
|
Invention
|
Intelligent security for zero trust in mobile networks with security platforms using a packet for... |
|
Invention
|
Browser isolation.
A method for securing browsing activity of a user using user equipment (UE) h... |
|
Invention
|
Resource monitoring and auditing.
A method for monitoring activity of a user interacting with a ... |
|
P/S
|
Software as a service (SAAS) services featuring software using artificial intelligence for the mo... |
|
P/S
|
Software as a service (SAAS) services featuring software
using artificial intelligence for the m... |
2023
|
Invention
|
Automated service worker installation for client-initiated user identification and dlp scanning. ... |
|
Invention
|
Enhanced internal host detection protocol.
Techniques for an enhanced internal host detection pr... |
|
Invention
|
Cross protocol malware traffic detection using a two-layer ml architecture.
A system, method, an... |
|
Invention
|
Context-based sensitive message detection.
A context-based chat message data loss prevention sys... |
|
Invention
|
Route adaptive intelligent traffic offloading.
A host with a firewall and an offload device can ... |
|
Invention
|
Multi-factor authentication fatigue attack detection and blocking.
An MFA fatigue attack detecto... |
|
Invention
|
Global search of a security related data store using natural language processing.
Techniques for... |
|
Invention
|
Machine learning system for multi-domain long document clustering.
A model pipeline has been cre... |
|
Invention
|
Cloud firewall configuration management using graph data model.
A system, method, and device for... |
|
Invention
|
Real-time attribution of tools and campaigns for dns tunneling traffic.
Various embodiments prov... |
|
Invention
|
Multiple data center compatible deployment of applications matching a wildcard domain name.
A ne... |
|
Invention
|
Security rule conversion and performance evaluation.
A cybersecurity rule conversion system (“co... |
|
Invention
|
Real time coaching and prevention of human-centric security vulnerabilities.
The disclosed syste... |
|
Invention
|
Intelligent security for zero trust in mobile networks with security platforms using a diameter p... |
|
Invention
|
Context-based cyberattack signature generation with large language models.
A context-based cyber... |
|
Invention
|
Application programming interface intent based behavior summarization.
A generative artificial i... |
|
Invention
|
Automated satellite device authentication to a portal for secure remote access.
Techniques for a... |
|
Invention
|
Security alert prioritization for cloud-based resources.
Methods, storage systems and computer p... |
|
Invention
|
Data centric approach for supporting multiple inline cloud services.
Techniques for a data centr... |
|
Invention
|
Machine learning for prioritizing traffic in multi-purpose inline cloud analysis (mica) to enhanc... |
|
Invention
|
Configuring application availability using anycast addressing.
Anycast addressing is utilized to... |
|
Invention
|
Automated code signature generation for windows .net binaries.
Various embodiments provide a sys... |
|
Invention
|
Watermarking.
A method of controlling access to a digital resource of a group of digital resourc... |
2022
|
P/S
|
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and... |
|
P/S
|
Providing information, analytics and statistics about
commodities for use in the field of financ... |
|
P/S
|
Providing temporary use of non-downloadable software for autonomous threat detection, collection,... |
|
P/S
|
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte... |
|
P/S
|
Providing on-line non-downloadable software for data mining, connecting with internet protocol ad... |
|
P/S
|
Downloadable software and applications for detecting,
collecting, monitoring, and analyzing patt... |
|
P/S
|
Promoting best practices and providing consumer information related to cybersecurity threat intel... |
|
P/S
|
Promoting best practices and consumer information related to
cybersecurity threat intelligence a... |
2021
|
P/S
|
Monitoring of computer systems for security purposes. |
|
P/S
|
Computer hardware, namely, firewalls and networks security devices in the nature of network route... |
|
P/S
|
Computer hardware, namely, firewalls and networks security
devices in the nature of network rout... |
|
P/S
|
Consumer network security devices, namely, firewalls,
routers, wifi hotspots, and mesh networks ... |
|
P/S
|
Providing nondownloadable instructional materials and guidelines in the field of computer softwar... |
|
P/S
|
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ... |
2020
|
P/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer security... |
|
P/S
|
Computer hardware, namely, firewalls and network security
devices; downloadable computer softwar... |
|
P/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer software... |
|
P/S
|
Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t... |
|
P/S
|
Downloadable computer software for monitoring, managing and securing computer systems and network... |
2019
|
P/S
|
Computer hardware, namely, firewalls and networks security devices; computer software for compute... |
|
P/S
|
Downloadable computer software for computer network security, namely downloadable computer securi... |
|
P/S
|
Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits... |
|
P/S
|
Providing a database featuring information, analytics and
statistics about commodities for use i... |
|
P/S
|
downloadable computer software for computer network security technical support services, namely, ... |
|
P/S
|
Technological consultation in the field of computer networking and network security, excluding te... |
2018
|
P/S
|
Providing temporary use of non-downloadable computer software for browsing and accessing computer... |