2025
|
P/S
|
Computer hardware; Computer switches; Ethernet switches; Electrical switches; Telecommunication s... |
|
Invention
|
Systems and methods for generating synthetic data representing insider attacks.
Systems, methods... |
|
Invention
|
Systems and methods for fine grained forward testing for a ztna environment.
Systems, devices, a... |
|
Invention
|
Active vulnerability detection for a compute environment.
Improved vulnerability detection in a ... |
2024
|
Invention
|
Adjusting behavior of an endpoint security agent based on network location.
Systems and methods ... |
|
Invention
|
Systems and methods for network flow reordering.
Various embodiments provide systems and methods... |
|
Invention
|
Network address translation (nat) hole punching over software-defined wide area networking (sd-wa... |
|
Invention
|
Use of ephemeral workloads to monitor compute environments.
Approaches to use of ephemeral workl... |
|
Invention
|
Virtual private cloud user interface.
A method is disclosed. The method comprises receiving data... |
|
Invention
|
Software defined network access for endpoint.
Multiple types of lines are made simultaneously av... |
|
Invention
|
Architecture for a generative artificial intelligence (ai)-enabled assistant. Architecture for a ... |
|
Invention
|
Customizable generative artificial intelligence (‘ai’) assistant. Providing a customizable genera... |
2023
|
Invention
|
Automotive security configuration management.
A request to check for updated configuration files... |
|
Invention
|
Path selection strategy utilizing type of service (tos) in software-defined wide area network (sd... |
|
Invention
|
Transparent proxy mode authentication in dns ddos mitigation.
A UDP DNS query from a client, and... |
|
Invention
|
Federated abnormal process detection for kubernetes clusters.
No abstract |
|
Invention
|
Management of wireless and wired multicast traffic.
Stations are monitored that join and leave a... |
|
Invention
|
Validation engine for firewall migration.
Log data is gathered from the first firewall. The log ... |
|
Invention
|
Insider threat reporting mechanism.
A system is disclosed. The system includes at least one phys... |
|
Invention
|
Zero-trust network access (ztna) secure traffic forwarding.
Systems and methods for performing Z... |
|
Invention
|
Code analysis feedback loop for code created using generative artificial intelligence (‘ai’). Met... |
|
Invention
|
Poisoning and tracking credentials for phishing web sites.
Poisoned credentials are entered to t... |
|
Invention
|
Methods for host and user risk computation in security information and event management systems. ... |
|
Invention
|
Proactively assist roaming of wi-fi 6e stations with smart-management of fast bss transition.
A ... |
|
Invention
|
Disrupting connections between rogue access points and rogue stations with spoofed bss transition... |
|
Invention
|
Management of multicast traffic using multi-link operation (mlo) in wi-fi 7.
A Wi-Fi controller ... |
|
Invention
|
Ztna token based forwarding path generation mechanism.
A system is disclosed. The system include... |
|
Invention
|
Performing fingerprint-based data loss prevention (dlp) using information obtained from cloud-nat... |
|
Invention
|
Systems and methods for a heuristic tree optimization using a prioritized dimension selection for... |
|
Invention
|
Cross-platform native browser isolation.
Native Browser Isolation (NBI) distributes resource req... |
|
Invention
|
Hardware-assisted passive application monitoring.
A processor has hardware acceleration enabled ... |
|
Invention
|
Smart bss-coloring to overcome co-channel-interference (cci) for wi-fi6.
Scan reports are receiv... |
|
Invention
|
Online code similarity and maliciousness searching using a vector database.
Techniques relate ge... |
|
Invention
|
Dynamically maximizing sub-channel bandwidth utilization for ofdma transmissions with artificial ... |
|
Invention
|
Predictive artificial intelligence (ai)-based wireless station load balancing based on access poi... |
|
Invention
|
Cryptographic proofs for seamless single sign-on (sso) to cloud services based on on-premises aut... |
|
Invention
|
Dynamic env setting signature by two-dimensional random key.
During an initial bootup in a bootl... |
|
Invention
|
Coordination of probe response restrictions in multiple wi-fi 7 access point on a wlan.
A Wi-Fi ... |
|
Invention
|
Guided interactions with a natural language interface. Guided interactions with a natural languag... |
|
Invention
|
Identifying network-based attacks on physical operational technology (ot) devices with decoy ot d... |
|
Invention
|
Compute environment security monitoring using data collected from a sub-kernel space. A data coll... |
|
Invention
|
Using user feedback for attack path analysis in an anomaly detection framework. Using user feedba... |
|
Invention
|
Composite events indicative of multifaceted security threats within a compute environment. Data p... |
2022
|
P/S
|
Software as a service (SAAS) services, featuring software for use in providing cybersecurity moni... |
|
Invention
|
Customer onboarding and integration with anomaly detection systems. Systems and methods for custo... |
|
Invention
|
Operational adjustment for an agent collecting data from a cloud compute environment monitored by... |
|
Invention
|
Establishing a location profile for a user device. Establishing a location profile for a user dev... |
|
Invention
|
Tracking infrastructure as code (iac) asset lifecycles. Monitoring tracking infrastructure as cod... |
|
Invention
|
Interdependence of agentless and agent-based operations by way of a data platform. An illustrativ... |
|
Invention
|
Optimizing data warehouse utilization by a data ingestion pipeline. Optimizing data warehouse uti... |
|
Invention
|
Reducing amounts of data ingested into a data warehouse. Reducing amounts of data ingested into a... |
|
Invention
|
Analyzing log data from multiple sources across computing environments. Analyzing log data from m... |
|
P/S
|
data processing equipment, namely, computers, computer network routers, wireless routers and emb... |
2021
|
P/S
|
Operating system programs; computer operating programs and computer operating systems; computer s... |
|
P/S
|
Computer hardware; data processors; data processing equipment, namely, content processors; networ... |
|
P/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Computer hardw... |
|
P/S
|
Computer hardware; computer hardware, namely, wireless access point (WAP) devices; LAN (local are... |
|
P/S
|
Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; LAN (local are... |
2018
|
P/S
|
Computer network gateway hardware and software for enabling
computer gateway services, namely, f... |
|
P/S
|
Computer consulting services; computer software and network
security research and development se... |
|
P/S
|
Operating system programs; Computer operating programs and computer operating systems; computer s... |
2017
|
P/S
|
Information technology consulting services; Computer software consulting; Computer consultation i... |
2015
|
P/S
|
Computer hardware; computer switches; Ethernet switches; Automatic transfer switches (ATS); compu... |
2014
|
P/S
|
computer services, namely, cloud hosting provider services; consulting services in the field of c... |
|
P/S
|
Providing return merchandise authorization services, namely, management of returned merchandise a... |
|
P/S
|
Electronic software updates, namely, downloadable computer software and associated data files for... |
|
P/S
|
Computer hardware; wide area and local area computer network hardware, firmware and software, for... |
|
P/S
|
Monitoring of computer systems for security purposes; consulting services in the field of maintai... |
|
P/S
|
Data processing equipment; computer hardware; network hardware; network gateway hardware; softwar... |
2010
|
P/S
|
Computer network operating system featuring network
security, network management, processing of ... |
|
P/S
|
Computer consulting services, namely, computer software,
hardware, firmware, and network consult... |
|
P/S
|
Computer hardware; wide area and local area network
hardware, firmware and software, for managin... |
|
P/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for monitori... |
|
P/S
|
Electronic software updates, namely, downloadable computer
software and associated data files fo... |
|
P/S
|
Computer hardware; wide area and local area network
hardware, firmware and software for promotin... |
2008
|
P/S
|
Computer network operating system featuring network security, network management, processing of n... |
|
P/S
|
Computer hardware; wide area and local area network hardware, firmware and software for monitorin... |
|
P/S
|
Computer hardware; wide area and local area network hardware, firmware and software for promoting... |
|
P/S
|
Computer hardware; wide area and local area network hardware, firmware and software, for managing... |
|
P/S
|
Computer software for protecting computer systems and mobile devices to promote network efficienc... |
2007
|
P/S
|
Computer hardware; network hardware; network gateway hardware; computer software; downloadable co... |
|
P/S
|
Computer hardware; network hardware; computer software; downloadable computer software; firmware;... |
2004
|
P/S
|
Hosting the websites on a computer server for a global computer network |
|
P/S
|
Computer hardware namely Computer Network Gateway. Network Security Consulting. |
|
P/S
|
Computer hardware namely Computer Network gateway. Network Security Consulting. |
2001
|
P/S
|
computer network operating system featuring network security, network management, processing of n... |
|
P/S
|
computer network gateway hardware and software for enabling computer gateway services, namely, fo... |