2023
|
Invention
|
Distributed identity-based firewall policy evaluation.
Methods and systems for identity-based fi... |
|
Invention
|
Cloud native virtual machine runtime protection.
A system and method for cloud native virtual ma... |
|
Invention
|
Efficient virtual machine scanning.
A system and method for scanning of virtual machine images. ... |
|
Invention
|
Securing application behavior in serverless computing.
A method for securing a serverless applic... |
|
Invention
|
Profiling of spawned processes in container images and enforcing security policies respective the... |
2022
|
Invention
|
Securing application behavior in serverless computing. A method for securing a serverless applica... |
|
Invention
|
Software package analysis for detection of malicious properties. A system facilitates detection o... |
|
Invention
|
Techniques for protecting cloud native environments based on cloud resource access.
A system and... |
|
Invention
|
System and method for selection and discovery of vulnerable software packages. A system and metho... |
2021
|
Invention
|
Cloud native virtual machine runtime protection. A system and method for cloud native virtual mac... |
|
Invention
|
Techniques for protecting applications from unsecure network exposure.
A method and system for p... |
|
Invention
|
System and method for distributed security forensics. A host device and methods for efficient dis... |
|
Invention
|
Cloud native discovery and protection. A system and method for cloud native discovery and protect... |
|
Invention
|
System and method for defending applications invoking anonymous functions.
A system and method f... |
|
Invention
|
Techniques for securing execution environments by quarantining software containers. A system and ... |
|
Invention
|
System and method for selection and discovery of vulnerable software packages.
A system and meth... |
2020
|
Invention
|
System and method for application traffic and runtime behavior learning and enforcement.
Systems... |
|
Invention
|
System and method for zero trust network security.
Systems and methods for zero trust network se... |
|
Invention
|
Distributed identity-based firewall policy evaluation. Methods and systems for identity-based fir... |
|
Invention
|
Efficient virtual machine scanning. A system and method for scanning of virtual machine images. T... |
|
Invention
|
System and method for distributed security forensics using process path encoding. A host device a... |
|
Invention
|
On-the-fly creation of transient least privileged roles for serverless functions. The disclosed s... |
|
Invention
|
Filesystem action profiling of containers and security enforcement. A system and method for secur... |
2019
|
Invention
|
System and method for providing contextual forensic data for user activity-related security incid... |
|
Invention
|
Radar visualization of cloud native environments. A plurality of connection patterns is determine... |
2018
|
Invention
|
Techniques for protecting cloud native environments based on cloud resource access. A system and ... |
|
Invention
|
Static detection of vulnerabilities in base images of software containers. A system and method fo... |
|
Invention
|
Detection of botnets in containerized environments. A method and system for runtime detection of ... |
|
Invention
|
Traffic enforcement in containerized environments. A system and method for traffic enforcement in... |
|
Invention
|
Techniques for protecting applications from unsecure network exposure. A method and system for pr... |
|
Invention
|
System and method for protecting serverless applications.
A system and methods for protecting a ... |
|
Invention
|
System and method for distributed security forensics. A host device and method for efficient dist... |
|
Invention
|
Techniques for serverless runtime application self-protection. A system and method for serverless... |
|
Invention
|
System and method for defending applications invoking anonymous functions. A system and method fo... |
|
Invention
|
Techniques for maintaining image integrity in containerized applications. A system and method for... |
|
Invention
|
Methods for securing serverless functions.
A system and methods for protecting a serverless func... |
|
Invention
|
Dynamically adapted traffic inspection and filtering in containerized environments. A system and ... |
|
Invention
|
Runtime detection and mitigation of vulnerabilities in application software containers. A system ... |
2017
|
Invention
|
Networking-based profiling of containers and security enforcement. A system and method for securi... |
|
Invention
|
Detection of vulnerable root certificates in software containers. A method and system for detecti... |
|
Invention
|
Profiling of container images and enforcing security policies respective thereof. A method for se... |