2023
|
Invention
|
Malicious js detection based on automated user interaction emulation.
Detection of malicious Jav... |
|
Invention
|
Detecting behavioral change of iot devices using novelty detection based behavior traffic modelin... |
|
Invention
|
Iot device application workload capture.
Internet of Things (IoT) device application workload ca... |
|
Invention
|
Providing application security using causal graph.
Computer systems and methods are provided for... |
|
Invention
|
Detecting patient-zero exfiltration attacks on websites using taint tracking.
An execution envir... |
|
Invention
|
Context profiling for malware detection.
Analysis of samples for maliciousness is disclosed. A s... |
|
G/S
|
Software as a service (SAAS) services featuring software using artificial intelligence for the mo... |
|
Invention
|
Innocent until proven guilty (iupg): adversary resistant and false positive resistant deep learni... |
|
Invention
|
Inline package name based supply chain attack detection and prevention.
Inline package name base... |
|
Invention
|
Identification of malicious domain campaigns using unsupervised clustering.
The technology prese... |
|
Invention
|
Packet classification for network routing.
Techniques for packet classification for network rout... |
|
Invention
|
Security appliance to monitor networked computing environment.
A security appliance samples data... |
|
Invention
|
Automated extraction and classification of malicious indicators.
Techniques for generating actio... |
|
Invention
|
High availability of cloud-based serivces with address translation.
Described herein are system... |
|
G/S
|
Cloud-native application protection platform for an early threat detection and prevention system ... |
|
Invention
|
Inline package name based supply chain attack detection and prevention. Inline package name based... |
|
Invention
|
Intent-based query and response routing between users and backend services. For a seamless and ro... |
|
Invention
|
Whitelisting clients accessing resources via a secure web gateway with time-based one time passwo... |
|
Invention
|
Cobalt strike beacon http c2 heuristic detection.
Techniques for Cobalt Strike Beacon HTTP C2 he... |
|
Invention
|
Consistent monitoring and analytics for security insights for network and security functions for ... |
|
Invention
|
Applying subscriber-id based security, equipment-id based security, and/or network slice-id based... |
|
Invention
|
Cobalt strike beacon http c2 heuristic detection. Techniques for Cobalt Strike Beacon HTTP C2 heu... |
|
Invention
|
Network attack detection with targeted feature extraction from exploit tools. The present applica... |
|
Invention
|
Sample traffic based self-learning malware detection.
Techniques for sample traffic based self-l... |
|
Invention
|
Securing control and user plane separation in mobile networks.
Techniques for securing control a... |
|
Invention
|
Attack chain identification via misconfigurations in cloud resources. A cloud resource management... |
|
Invention
|
Rendering contextual security information determined in-browser with web pages of cloud and saas ... |
|
Invention
|
Application traffic flow prediction based on multi-stage network traffic flow scanning. In a netw... |
|
Invention
|
Dynamic management of packet loss.
Exemplary methods, apparatuses, and systems include duplicati... |
2022
|
G/S
|
Providing non-downloadable software for autonomous threat
detection, collection, monitoring, and... |
|
G/S
|
Providing information, analytics and statistics about
commodities for use in the field of financ... |
|
G/S
|
Providing non-downloadable software for autonomous threat detection, collection, monitoring, and ... |
|
G/S
|
Downloadable software and applications for detecting, collecting, monitoring, and analyzing patte... |
|
G/S
|
Providing on-line non-downloadable software for data mining, connecting with internet protocol ad... |
|
G/S
|
Downloadable software and applications for detecting,
collecting, monitoring, and analyzing patt... |
|
G/S
|
Promoting best practices and providing consumer information related to cybersecurity threat intel... |
|
G/S
|
Promoting best practices and consumer information related to
cybersecurity threat intelligence a... |
|
Invention
|
Inline malicious url detection with hierarchical structure patterns.
A hierarchical structure co... |
|
Invention
|
Deploying ipv6 routing.
Techniques for deploying IPv6 routing are disclosed. A system, process, ... |
|
Invention
|
Application precedence based traffic policy enforcement.
Assigning priority values to applicatio... |
|
Invention
|
Optical character recognition filtering.
An OCR filter described herein filters non-textual file... |
|
Invention
|
Application traffic flow prediction based on multi-stage network traffic flow scanning.
In a net... |
|
Invention
|
Supporting overlapping network addresses universally.
Techniques for supporting overlapping netw... |
|
Invention
|
Detecting shadowed domains.
A method and system for detecting shadowed domains is provided. New ... |
|
Invention
|
Text classification of api documentation for informing security policy creation.
An API response... |
|
Invention
|
Method to classify compliance protocols for saas apps based on web page content.
The present app... |
|
Invention
|
Probing for cobalt strike teamserver detection.
Techniques for probing for Cobalt Strike TeamSer... |
|
Invention
|
Beacon and threat intelligence based apt detection.
Techniques for beacon and threat intelligenc... |
|
Invention
|
Heuristic database querying with dynamic partitioning. Dynamic partitioning of a search space of ... |
|
Invention
|
Attack chain identification via misconfigurations in cloud resources.
A cloud resource managemen... |
|
Invention
|
Unified parked domain detection system.
The present application discloses a method, system, and ... |
|
Invention
|
Cobalt strike beacon https c2 heuristic detection.
Techniques for Cobalt Strike Beacon HTTPS C2 ... |
|
Invention
|
Data slicing for internet asset attribution.
An asset attribution model attributes assets to org... |
|
Invention
|
Network attack detection with targeted feature extraction from exploit tools.
The present applic... |
|
Invention
|
Sequential dual machine learning models for effective cloud detection engines.
The present appli... |
|
Invention
|
5g lan security.
Techniques for 5G LAN security in mobile networks are disclosed. In some embodi... |
|
G/S
|
Providing temporary use of non-downloadable software for autonomous threat detection, collection,... |
|
Invention
|
Fast policy matching with runtime signature update.
Techniques for fast policy matching with run... |
|
Invention
|
Blocking download of content. At least initially blocking client download of certain content and ... |
2021
|
G/S
|
Monitoring of computer systems for security purposes, namely, for detecting and preventing unauth... |
|
G/S
|
Monitoring of computer systems for security purposes. |
|
G/S
|
Computer hardware, namely, firewalls and networks security devices in the nature of network route... |
|
G/S
|
Consumer network security devices, namely, firewalls,
routers, wifi hotspots, and mesh networks ... |
|
G/S
|
Computer hardware, namely, firewalls and networks security
devices in the nature of network rout... |
|
G/S
|
Providing nondownloadable instructional materials and guidelines in the field of computer softwar... |
|
G/S
|
Consumer network security devices, namely, firewalls, routers, wireless hotspots, and mesh networ... |
2020
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer security... |
|
G/S
|
Computer hardware, namely, firewalls and network security
devices; downloadable computer softwar... |
|
G/S
|
Computer hardware, namely, firewalls and network security devices; downloadable computer software... |
|
G/S
|
Computer hardware, peripherals and manuals supplied therewith; computer soft-ware for enhancing t... |
|
G/S
|
Downloadable computer software for monitoring, managing and securing computer systems and network... |
2019
|
G/S
|
Computer hardware, namely, firewalls and networks security devices; computer software for compute... |
|
G/S
|
Computer hardware, namely, firewalls and networks security devices, excluding integrated circuits... |
|
G/S
|
Providing a database featuring information, analytics and
statistics about commodities for use i... |
|
G/S
|
downloadable computer software for computer network security technical support services, namely, ... |
|
G/S
|
Technological consultation in the field of computer networking and network security, excluding te... |
2018
|
G/S
|
Providing temporary use of non-downloadable computer software for browsing and accessing computer... |
2017
|
G/S
|
Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malw... |
|
G/S
|
Publication of on-line journals, namely, blogs featuring information related to computer system a... |
|
G/S
|
On-line journals, namely, blogs featuring information in the field of computer system and cloud s... |
2015
|
G/S
|
Software as a service (SAAS) services featuring software for data security and system security in... |