Palo Alto Networks, Inc.

United States of America


 
Total IP 896
Total IP incl. subs 897 (+ 1 for subs)
Total IP Rank # 1,437
IP Activity Score 3.6/5.0    797
IP Activity Rank # 902
Stock Symbol
ISIN US6974351057
Market Cap. 23,900M  (USD)
Industry Software - Application
Sector Technology
Dominant Nice Class Scientific, technological and in...

Patents

Trademarks

773 26
5 15
58 11
8
 
Last Patent 2024 - Inline malicious url detection w...
First Patent 1994 - Remote smart filtering communica...
Last Trademark 2023 - PRECISION AI
First Trademark 2007 - PAN-OS

Subsidiaries

1 subsidiaries with IP (1 patents, 0 trademarks)

 Register for free to unlock the subsidiary list

Industry (Nice Classification)

Latest Inventions, Goods, Services

2023 Invention Malicious js detection based on automated user interaction emulation. Detection of malicious Jav...
Invention Detecting behavioral change of iot devices using novelty detection based behavior traffic modelin...
Invention Iot device application workload capture. Internet of Things (IoT) device application workload ca...
Invention Providing application security using causal graph. Computer systems and methods are provided for...
Invention Detecting patient-zero exfiltration attacks on websites using taint tracking. An execution envir...
Invention Context profiling for malware detection. Analysis of samples for maliciousness is disclosed. A s...
G/S Software as a service (SAAS) services featuring software using artificial intelligence for the mo...
Invention Innocent until proven guilty (iupg): adversary resistant and false positive resistant deep learni...
Invention Inline package name based supply chain attack detection and prevention. Inline package name base...
Invention Identification of malicious domain campaigns using unsupervised clustering. The technology prese...
Invention Packet classification for network routing. Techniques for packet classification for network rout...
Invention Security appliance to monitor networked computing environment. A security appliance samples data...
Invention Automated extraction and classification of malicious indicators. Techniques for generating actio...
Invention High availability of cloud-based serivces with address translation. Described herein are system...
G/S Cloud-native application protection platform for an early threat detection and prevention system ...
Invention Inline package name based supply chain attack detection and prevention. Inline package name based...
Invention Intent-based query and response routing between users and backend services. For a seamless and ro...
Invention Whitelisting clients accessing resources via a secure web gateway with time-based one time passwo...
Invention Cobalt strike beacon http c2 heuristic detection. Techniques for Cobalt Strike Beacon HTTP C2 he...
Invention Consistent monitoring and analytics for security insights for network and security functions for ...
Invention Applying subscriber-id based security, equipment-id based security, and/or network slice-id based...
Invention Cobalt strike beacon http c2 heuristic detection. Techniques for Cobalt Strike Beacon HTTP C2 heu...
Invention Network attack detection with targeted feature extraction from exploit tools. The present applica...
Invention Sample traffic based self-learning malware detection. Techniques for sample traffic based self-l...
Invention Securing control and user plane separation in mobile networks. Techniques for securing control a...
Invention Attack chain identification via misconfigurations in cloud resources. A cloud resource management...
Invention Rendering contextual security information determined in-browser with web pages of cloud and saas ...
Invention Application traffic flow prediction based on multi-stage network traffic flow scanning. In a netw...
Invention Dynamic management of packet loss. Exemplary methods, apparatuses, and systems include duplicati...
2022 G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and...
G/S Providing information, analytics and statistics about commodities for use in the field of financ...
G/S Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte...
G/S Providing on-line non-downloadable software for data mining, connecting with internet protocol ad...
G/S Downloadable software and applications for detecting, collecting, monitoring, and analyzing patt...
G/S Promoting best practices and providing consumer information related to cybersecurity threat intel...
G/S Promoting best practices and consumer information related to cybersecurity threat intelligence a...
Invention Inline malicious url detection with hierarchical structure patterns. A hierarchical structure co...
Invention Deploying ipv6 routing. Techniques for deploying IPv6 routing are disclosed. A system, process, ...
Invention Application precedence based traffic policy enforcement. Assigning priority values to applicatio...
Invention Optical character recognition filtering. An OCR filter described herein filters non-textual file...
Invention Application traffic flow prediction based on multi-stage network traffic flow scanning. In a net...
Invention Supporting overlapping network addresses universally. Techniques for supporting overlapping netw...
Invention Detecting shadowed domains. A method and system for detecting shadowed domains is provided. New ...
Invention Text classification of api documentation for informing security policy creation. An API response...
Invention Method to classify compliance protocols for saas apps based on web page content. The present app...
Invention Probing for cobalt strike teamserver detection. Techniques for probing for Cobalt Strike TeamSer...
Invention Beacon and threat intelligence based apt detection. Techniques for beacon and threat intelligenc...
Invention Heuristic database querying with dynamic partitioning. Dynamic partitioning of a search space of ...
Invention Attack chain identification via misconfigurations in cloud resources. A cloud resource managemen...
Invention Unified parked domain detection system. The present application discloses a method, system, and ...
Invention Cobalt strike beacon https c2 heuristic detection. Techniques for Cobalt Strike Beacon HTTPS C2 ...
Invention Data slicing for internet asset attribution. An asset attribution model attributes assets to org...
Invention Network attack detection with targeted feature extraction from exploit tools. The present applic...
Invention Sequential dual machine learning models for effective cloud detection engines. The present appli...
Invention 5g lan security. Techniques for 5G LAN security in mobile networks are disclosed. In some embodi...
G/S Providing temporary use of non-downloadable software for autonomous threat detection, collection,...
Invention Fast policy matching with runtime signature update. Techniques for fast policy matching with run...
Invention Blocking download of content. At least initially blocking client download of certain content and ...
2021 G/S Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth...
G/S Monitoring of computer systems for security purposes.
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network route...
G/S Consumer network security devices, namely, firewalls, routers, wifi hotspots, and mesh networks ...
G/S Computer hardware, namely, firewalls and networks security devices in the nature of network rout...
G/S Providing nondownloadable instructional materials and guidelines in the field of computer softwar...
G/S Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ...
2020 G/S Computer hardware, namely, firewalls and network security devices; downloadable computer security...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer softwar...
G/S Computer hardware, namely, firewalls and network security devices; downloadable computer software...
G/S Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t...
G/S Downloadable computer software for monitoring, managing and securing computer systems and network...
2019 G/S Computer hardware, namely, firewalls and networks security devices; computer software for compute...
G/S Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits...
G/S Providing a database featuring information, analytics and statistics about commodities for use i...
G/S downloadable computer software for computer network security technical support services, namely, ...
G/S Technological consultation in the field of computer networking and network security, excluding te...
2018 G/S Providing temporary use of non-downloadable computer software for browsing and accessing computer...
2017 G/S Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malw...
G/S Publication of on-line journals, namely, blogs featuring information related to computer system a...
G/S On-line journals, namely, blogs featuring information in the field of computer system and cloud s...
2015 G/S Software as a service (SAAS) services featuring software for data security and system security in...