|
2025
|
P/S
|
Providing on-line non-downloadable software for for cybersecurity education and employee training... |
|
|
P/S
|
Downloadable and recorded computer application software for desktop computers, handheld computers... |
|
|
P/S
|
downloadable software suite featuring cybersecurity software, e-mail threat protection and intell... |
|
|
Invention
|
Using neural networks to process forensics and generate threat intelligence information.
Aspects... |
|
|
Invention
|
Neural network host platform for detecting anomalies in cybersecurity modules.
Aspects of the di... |
|
|
Invention
|
Distributed attribute based access control as means of data protection and collaboration in sensi... |
|
|
Invention
|
Uniform resource locator classifier and visual comparison platform for malicious site detection. ... |
|
|
Invention
|
Cloud content scanning using locally deployed containerized scanners.
The technology disclosed h... |
|
|
Invention
|
Processing external messages using a secure email relay.
Aspects of the disclosure relate to pro... |
|
|
Invention
|
Data posture analysis using a distinct scanner environment.
The technology disclosed relates to ... |
|
|
Invention
|
Systems and methods for detecting risk events in a computing environment using infrastructure gra... |
|
|
Invention
|
Data discovery and classification using sampling-based scanning techniques.
The technology discl... |
|
|
Invention
|
Systems and methods for query term analytics.
A query term analytics system receives a search qu... |
|
|
Invention
|
Systems and methods for in-process url condemnation.
A universal resource locator (URL) collider... |
|
|
Invention
|
Dynamic message analysis platform for enhanced enterprise security.
Aspects of the disclosure re... |
|
|
P/S
|
Downloadable and record computer software for searching, detecting, blocking, filtering, tagging,... |
|
|
Invention
|
Computing system data posture analysis using signature encoders with similarity queries.
The tec... |
|
|
Invention
|
System and methods for agentless managed device identification as part of setting a security poli... |
|
|
Invention
|
Secure url shortener for character-limited messages.
Aspects of the disclosure relate to providi... |
|
|
Invention
|
Systems and methods for email campaign domain classification.
A domain processing system receive... |
|
|
Invention
|
Computing system access path detection and governance for data security posture management.
A sy... |
|
|
Invention
|
Systems and methods for prioritizing url review for sandboxing based on accelerated velocities of... |
|
|
Invention
|
Automatic triaging of network events.
Automatically triaging network events such as data loss pr... |
|
|
Invention
|
Misdirected email data loss prevention.
Aspects of the disclosure relate to data loss prevention... |
|
|
Invention
|
Cloud infrastructure excessive resource permission detection based on semantic grouping.
A compu... |
|
|
Invention
|
Security posture detection of a cloud environment.
The technology disclosed relates to detecting... |
|
|
Invention
|
System and method to enable shared saas multi-tenancy using customer data storage, customer-contr... |
|
|
Invention
|
Lookalike domain identification.
Aspects of the disclosure relate to identifying domain name loo... |
|
2024
|
Invention
|
Content-based socially-engineered threat classifier.
Threat detection systems and methods in whi... |
|
|
P/S
|
Computer services, namely, computer system administration for others; Cybersecurity services in t... |
|
|
P/S
|
Software as a service (SAAS) services featuring software using artificial intelligence (AI) for i... |
|
|
P/S
|
Providing on-line non-downloadable software for use in behavioral analytics; Software as a servic... |
|
|
P/S
|
Downloadable computer software for browser security, cyber threat detection, secure and safe brow... |
|
|
Invention
|
Using signed tokens to verify short message service (sms) message bodies.
Aspects of the disclos... |
|
|
Invention
|
Machine learning uniform resource locator (url) classifier.
Aspects of the disclosure relate to ... |
|
|
Invention
|
Detecting and preventing transmission of spam messages using modified source numbers.
Aspects of... |
|
|
Invention
|
Modeling simulated cybersecurity attack difficulty.
Aspects of the disclosure relate to providin... |
|
|
Invention
|
Cloud data scanning based on incremental infrastructure detection.
The technology disclosed rela... |
|
|
Invention
|
Focused image grabbing.
A method includes monitoring user activities at an endpoint device on a ... |
|
|
Invention
|
Dynamically controlling access to linked content in electronic communications.
Aspects of the di... |
|
|
Invention
|
Managing and routing of endpoint telemetry using realms.
A computer network includes user endpoi... |
|
|
Invention
|
Determining authenticity of reported user action in cybersecurity risk assessment.
An electronic... |
|
|
Invention
|
Cloud data attack surface tracking using graph-based excessive privilege detection. A computer-im... |
|
|
Invention
|
Risk event detection using activity and graph-based context for cloud data security posture manag... |
|
|
Invention
|
Probe-based virtual network sensitive data traffic detection.
The technology disclosed relates t... |
|
|
Invention
|
Automatic risk remediation in multi-cloud environment.
The technology disclosed relates to analy... |
|
|
Invention
|
Data scan sampling control for data discovery and posture management. The disclosed technology re... |
|
|
Invention
|
Cloud resource prioritization for data security posture management based on detection of cloud da... |
|
|
Invention
|
Message management platform for performing impersonation analysis and detection. Aspects of the d... |
|
|
Invention
|
Identifying legitimate websites to remove false positives from domain discovery analysis. Aspects... |
|
|
Invention
|
Risk factors for an organization network.
A method for determining risks associated with an iden... |
|
2023
|
Invention
|
Database log analyzer in a cloud environment using microservice orchestration. The technology dis... |
|
|
Invention
|
System and method for light data file upload prevention.
A system preventing upload of a source ... |
|
|
Invention
|
Document open detection and remediation.
A computer system detects whether a new document has be... |
|
2022
|
Invention
|
Detecting insider user behavior threats by comparing a user’s behavior to the user’s prior behavi... |
|
2021
|
P/S
|
Online non-downloadable software that aggregates and correlates threat data points across email, ... |
|
2020
|
P/S
|
Providing private and secure real time electronic communication over cloud based computer network... |
|
2019
|
P/S
|
Computer software, namely, a software interface to identify, analyze and facilitate action agains... |
|
2018
|
P/S
|
Software as a service, namely, a software interface to identify, analyze and facilitate action ag... |
|
2017
|
P/S
|
Computer software for searching, detecting, blocking, filtering, tagging, compiling, indexing, an... |
|
2016
|
P/S
|
Computer security software for searching, detecting, blocking, filtering, tagging, compiling, ind... |
|
|
P/S
|
Software as a service, namely, a software interface to navigate threat intelligence, run threat a... |
|
2015
|
P/S
|
downloadable computer software and computer programs for cyber security training and reporting pu... |
|
|
P/S
|
cloud based software as a service (SAAS) services featuring software for cyber security training ... |
|
2013
|
P/S
|
computer services, namely, providing information updates relating to computer security and preven... |
|
2009
|
P/S
|
Computer software that is provided to clients to allow them to leverage data processing services ... |
|
2006
|
P/S
|
Computer software for detecting, filtering, monitoring, reporting, blocking, removing and prevent... |
|
2004
|
P/S
|
Computer software for detecting, filtering, monitoring, reporting, blocking, removing, and preven... |
|
2003
|
P/S
|
computer software for detecting, filtering, monitoring, reporting, blocking, removing, and preven... |
|
|
P/S
|
Computer software for the analysis and classification of information over and in information netw... |
|
1998
|
P/S
|
Computer software, namely, electronic mail transfer agent (MTA) and message storing system softwa... |