2024
|
Invention
|
Cybersecurity investigation tools utilizing information graphs.
Example apparatus disclosed here... |
|
Invention
|
One-click reputation adjustment.
In an example, there is disclosed a monolithic reputation updat... |
2023
|
Invention
|
System and method for detecting cyberattacks impersonating legitimate sources. A system and metho... |
|
Invention
|
System and method for automated system for triage of cybersecurity threats. A device for verifyin... |
|
Invention
|
Automated enforcement of security policies in cloud and hybrid infrastructure environments. To pr... |
|
Invention
|
Dynamic adaptive defense for cyber-security threats. Disclosed is a cyber-security system that is... |
|
Invention
|
Multi-vector malware detection data sharing system for improved detection. A computerized method ... |
2022
|
Invention
|
End-point visibility. A system for securing electronic devices includes a processor, a storage me... |
|
Invention
|
Advanced threat protection cross-product security controller. A system for securing electronic de... |
|
Invention
|
Subscription and key management system. One embodiment of the described invention is directed to ... |
|
Invention
|
System and method for circumventing evasive code for cyberthreat detection. One embodiment of the... |
|
Invention
|
Query engine for remote endpoint information retrieval. Embodiments are disclosed herein for remo... |
|
Invention
|
Methods and apparatus to mitigate firmware malware. Example methods and apparatus are disclosed h... |
|
Invention
|
Subscription-based malware detection. A computerized method is described for authenticating acces... |
|
Invention
|
System and method for scanning remote services to locate stored objects with malware. A non-trans... |
|
Invention
|
Agent presence for self-healing.
In one or more examples, there is disclosed a system and method... |
|
Invention
|
Apparatus and methods to classify malware with explainability with artificial intelligence models... |
|
Invention
|
Identifying malware-suspect end points through entropy changes in consolidated logs. Example meth... |
|
Invention
|
Heuristic model to self-manage and auto-update containerized services. the network interface tran... |
|
Invention
|
Distributed hybrid model for security as a service.
An apparatus includes a network interface an... |
|
Invention
|
Selective virtualization for security threat detection. Selective virtualization of resources is ... |
|
Invention
|
Dynamically remote tuning of a malware content detection system. According to one embodiment, an ... |
|
Invention
|
System and method for automatically prioritizing rules for cyber-threat detection and mitigation.... |
|
Invention
|
System and method for retrieval and analysis of operational data from customer, cloud-hosted virt... |
|
Invention
|
Malware detection verification and enhancement by coordinating endpoint and malware detection sys... |
|
Invention
|
System and method for improved end-to-end cybersecurity machine learning and deployment. The pres... |
|
Invention
|
Methods and apparatus for generic process chain entity mapping. Methods, apparatus, systems and a... |
2021
|
Invention
|
Methods and apparatus to implement a deterministic indicator and confidence scoring model. Method... |
|
Invention
|
Method and apparatus to identify creator of com process created using ole automation. An apparatu... |
|
Invention
|
System and method for detecting repetitive cybersecurity attacks constituting an email campaign. ... |
|
Invention
|
Detection of phishing attacks using similarity analysis. A computerized system and method to dete... |
|
Invention
|
Risk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the as... |
2020
|
Invention
|
Run-time configurable cybersecurity system. A system for conducting cyberthreat analytics on a su... |
|
Invention
|
Technique for verifying exploit/malware at malware detection appliance through correlation with e... |
|
Invention
|
Enterprise search. A method performed by an enterprise search system to conduct an automated, com... |
|
Invention
|
Attribute-controlled malware detection. A cloud-based system is design with multi-tenancy control... |
|
Invention
|
Distributed malware detection system and submission workflow thereof. As described, a cloud-based... |
|
Invention
|
System and method for cybersecurity analyzer update and concurrent management system. An electron... |
|
Invention
|
System and method for detecting malicious traffic using a virtual machine configured with a selec... |
2019
|
Invention
|
Automated system for triage of customer issues. A device for verifying previous determinations fr... |
|
Invention
|
System and method for identifying and mitigating cyberattacks through malicious position-independ... |
|
Invention
|
System and method for detecting and protecting against cybersecurity attacks on servers. An elect... |
|
Invention
|
System and method for supporting cross-platform data verification. A trust verification system fo... |
2018
|
Invention
|
System and method for selectively processing content after identification and removal of maliciou... |
|
Invention
|
System and method for bootkit detection. An embodiment of a computerized method for detecting boo... |
2016
|
Invention
|
Cyber-security framework for application of virtual features. A non-transitory storage medium hav... |