CrowdStrike, Inc.

États‑Unis d’Amérique


Commandez votre montre hebdomadaire CrowdStrike, Inc.
Quantité totale PI 469
Rang # Quantité totale PI 2 811
Note d'activité PI 3,3/5.0    374
Rang # Activité PI 1 881
Parent CrowdStrike Holdings, Inc.
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

390 32
0 10
14 16
7
 
Dernier brevet 2025 - Asynchronous blocking of exfiltr...
Premier brevet 2002 - Wireless network security
Dernière marque 2024 - CROWDSTRIKE
Première marque 2012 - CROWDSTRIKE

Industrie (Classification de Nice)

Derniers inventions, produits et services

2025 Invention System and method for utilizing and removing a non-persistent collector in a compute environment....
2024 Invention Probabilistic event linking. A method of monitoring a network for linked events includes receivin...
P/S Computer security consulting; consulting in the field of information technology; computer securi...
Invention Static analyzer instruction generation based on action of external initialization code during ini...
Invention Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server ...
Invention Directory service recommender assessment and scoring. A cybersecurity service assesses, scores, a...
Invention Risk scoring of cloud permission assignments using supervised machine learning. Techniques for ca...
Invention Threat classification in a streaming system. Techniques for identifying data usable for generatin...
Invention Data prefiltering for large scale data classification. Data prefiltering techniques for large sca...
Invention Entropy-based preemptive false positive mitigation. The present disclosure provides an approach o...
P/S Computer security consulting; consulting in the field of information technology; computer securit...
P/S Computer security consulting; consulting in the field of information technology; consultation in ...
Invention Conditional bloom filters representing field aliasing. Conditional Bloom filters improve computer...
Invention Rules generation to prioritize computer network devices. The present disclosure provides an appro...
P/S Software as a service (SaaS) services featuring software for automating customer interactions and...
P/S Software as a service (SaaS) services featuring software for automating customer interactions an...
Invention Injected byte buffer data classification. Methods and systems for injected byte buffer data class...
Invention Adversarial script generation using artificial intelligence models. The present disclosure provid...
Invention Localization middleware. A system and method of a localization middleware for localizing datasets...
Invention Semantic data determination using a large language model. Techniques for automatically determinin...
Invention Asynchronous blocking of exfiltration events via browser extensions. A cybersecurity data loss p...
Invention Large language model assisted cybersecurity platform. A system and method of using generative AI...
Invention Using artificial intelligence models with intermediate representations to analyze malicious files...
Invention Operational prediction on user-based contextual sessions. Contextual session-based operational p...
Invention Protective distributed database service. Computer nodes associated with a cluster store a distri...
Invention Using large language models to recommend and validate asset and/or cloud configurations. A syste...
2023 Invention Using large language models to generate natural language descriptions of code for enhanced threat...
Invention Counter adversary large language models. A system and method of using generative AI to maintain ...
Invention Large language model-based software reverse engineering assistant. Systems and methods of utiliz...
Invention Behavior-based asset classifications. Techniques, systems, and computer-readable media for dynam...
Invention Smart notification for structured and unstructured data. Systems and methods for providing cyber...
Invention Threat exposure management system using large language models. A system and method of using gene...
Invention Risk scoring of cloud permission assignments using supervised machine learning. Techniques for c...
Invention Risk scoring using supervised machine learning. Techniques for using supervised machine learning...
Invention Default-deny network egress architecture in a virtual private cloud. Methods and systems for des...
P/S Computer security consulting; Consulting in the field of information technology relating to insta...
Invention Cybersecurity typing and inferencing. A cybersecurity event validation service provides a user-f...
Invention Secure code clustering through llm-based semantic analysis. An approach is provided that provide...
Invention Monitoring file system operations using ebpf dfa architecture. A deterministic finite automata (...
Invention Secure code analysis copilot. An approach is provided that identifies a vulnerability correspond...
Invention Method and apparatus for data synchronization and persistence between computing devices. A compu...
Invention Adapters for runtime application self-protection. An approach is provided that trains an artific...
Invention Stable and discernable mapping of categorical data to colors for graphical display. Data is rece...
Invention Incremental solves using llms for api calls. Systems and methods for incremental solves using LL...
Invention Source code similarity. Automated source code similarity greatly improves computer functioning. ...
Invention Nodal redundancy storage decisions. Nodal redundancy storage decisions efficiently distribute red...
Invention Embedding entity matching. Embedding entity matching greatly improves computer functioning. Diff...
Invention Funnel techniques for natural language to api calls. The present disclosure produces a first out...
Invention Cybersecurity detection. A cybersecurity service protects endpoint devices from cybersecurity att...
Invention Threat classification in a streaming system. Techniques for identify data usable for generating ...
Invention Nodal work assignments in cloud computing. Nodal work assignments efficiently distribute server w...
Invention Techniques for assessing malware classification. A sample file that is associated with malware a...
Invention Techniques for delegated inter-party private set intersection. A method for detecting a private s...
Invention Assessing computer system vulnerabilities and exposures. Assessing computer system vulnerabiliti...
P/S Computer security consulting; consulting services in the field of information technology, namely...
P/S Business administration services; business services, namely, administration of a program for enab...
P/S Business analysis services, namely business profit analysis and business management analysis, bus...
P/S Business administration services; business services, namely, administration of a program for ena...
P/S Business analysis, research and information services; business consulting services in the field ...
Invention Rules-based malware resolution suggestions. A rules-based malware detection and assessment servi...
Invention Identifying patterns in large quantities of collected emails. A system and method of detecting m...
P/S Business administration services; Business services, namely, administration of a program for enab...
P/S Computer security consulting; consulting in the field of information technology; Computer securit...
P/S Business analysis, research and information services; business consulting services in the field o...
2022 P/S Computer security consulting; consulting in the field of Internet security and information securi...
P/S Computer security consulting; consulting in the field of information technology; consultation fo...
P/S Downloadable computer software for the protection and security of computer networks and computin...
P/S Educational services, namely, providing online and in-person courses of instruction for detecting...
P/S Computer software for computer and network security. Computer consultation services relating to c...
2021 P/S Computer security consulting; consulting in the field of information technology; consultation for...
P/S Providing online education in the nature of online courses in the fields of cybersecurity, endpoi...
P/S Providing information in the field of monetization of cybersecurity breaches for the protection o...
P/S Downloadable computer software for secure data access, namely, software providing a transparent ...
2020 P/S Providing a website featuring recommendations, ratings and reviews posted by consumers about loca...
P/S Software as a service (SAAS) services featuring software for computer and network security; softw...
P/S educational services, namely, providing online and onsite courses in the fields of cybersecurity,...
P/S computer security consulting; consulting in the field of information technology; consultation in ...
P/S DOWNLOADABLE COMPUTER SOFTWARE FOR SECURE DATA ACCESS, namely, SOFTWARE PROVIDING A TRANSPARENT L...
P/S Computer software for encryption.
P/S Downloadable and recorded computer search engine software; downloadable and recorded computer sof...
P/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, si...
P/S Downloadable computer software for secure data access, namely, software providing a transparent l...
2019 P/S Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig...
2018 P/S Downloadable computer software for computer and network security; computer software for scanning,...
P/S computer consultation; consulting in the field of information technology; computer consultation i...
2016 P/S Downloadable software for cloud and network security; Computer software for computer network secu...