2022
|
Invention
|
Intercept for encrypted communications.
Aspects of the disclosure include replacing, by a DNS pr... |
|
G/S
|
Downloadable computer programs for project management, product management, work collaboration, in... |
|
G/S
|
Software as a service (SAAS) services featuring software for project management, product manageme... |
|
Invention
|
Secure access to a corporate web application with translation between an internal address and an ... |
|
Invention
|
Amplification of initial training data. Techniques are disclosed relating to increasing the amoun... |
2021
|
Invention
|
Systems and methods for preserving system contextual information in an encapsulated packet.
In s... |
2020
|
G/S
|
Software as a Service (SAAS) services featuring cloud software security services, namely, monitor... |
2019
|
Invention
|
Secure access to a corporate application in an ssh session using a transparent ssh proxy. Secure ... |
|
Invention
|
Secure access to a corporate application using a facade. Secure access to a corporate application... |
|
Invention
|
Systems and methods for managing a need-to-know domain name system. The disclosed computer-implem... |
|
Invention
|
Systems and methods for protecting a cloud computing device from malware. The disclosed computer-... |
|
Invention
|
Systems and methods for safely executing unreliable malware. The disclosed computer-implemented m... |
|
G/S
|
Educational services, namely, conducting computer security training and classes in the field of s... |
|
Invention
|
Isolating an iframe of a webpage. Isolating an iframe of a webpage. In one embodiment, a method m... |
|
Invention
|
Identifying and protecting against an attack against an anomaly detector machine learning classif... |
|
Invention
|
Adjudicating files by classifying directories based on collected telemetry data. Telemetry data f... |
|
Invention
|
Systems and methods for protecting against malicious content. The disclosed computer-implemented ... |
|
Invention
|
Identifying and mitigating harm from malicious network connections by a container. Identifying an... |
|
Invention
|
Pre-filtering detection of an injected script on a webpage accessed by a computing device. Pre-fi... |
|
Invention
|
Systems and methods for utilizing metadata for protecting against the sharing of images in a comp... |
|
Invention
|
Systems and methods for preventing sharing of sensitive content in image data on a closed computi... |
|
Invention
|
Systems and methods for preparing a secure search index for securely detecting personally identif... |
|
Invention
|
Systems and methods for managing endpoint security states using passive data integrity attestatio... |
|
Invention
|
Systems and methods for malware detection using localized machine learning. The disclosed compute... |
|
Invention
|
Application behavioral fingerprints. Methods, systems, and devices for protecting against abnorma... |
|
Invention
|
Machine learning adversarial campaign mitigation on a computing device. Machine learning adversar... |
|
Invention
|
Knowledge-aware detection of attacks on a client device conducted with dual-use tools. Knowledge-... |
|
Invention
|
Systems and methods for detecting code implanted into a published application. The disclosed comp... |
|
Invention
|
Systems and methods for detecting and protecting against malicious use of legitimate computing-sy... |
|
Invention
|
Threat isolation for documents using distributed storage mechanisms. A cloud device is configured... |
|
Invention
|
Abnormal user behavior detection. A method for detecting and protecting against abnormal user beh... |
|
Invention
|
Automatically generating malware definitions using word-level analysis. Methods and systems are p... |
|
Invention
|
Systems and methods for protection of storage systems using decoy data. The disclosed computer-im... |
|
Invention
|
Systems and methods for preventing electronic form data from being electronically transmitted to ... |
|
Invention
|
Universal tracing of side-channel processes in computing environments. A method for identifying s... |
|
Invention
|
Discovery of computer system incidents to be remediated based on correlation between support inte... |
|
Invention
|
Securing cloud applications via isolation. A method for securing cloud applications is described.... |
2018
|
Invention
|
Systems and methods for providing an integrated cyber threat defense exchange platform. The discl... |
|
Invention
|
Secure quarantine of potentially malicious content. Secure Quarantine of Potentially Malicious Co... |
|
Invention
|
Document sanitization. In one embodiment, a method for electronic document sanitization may inclu... |
|
Invention
|
Systems and methods for producing adjustments to malware-detecting services. The disclosed comput... |
|
Invention
|
Systems and methods for preserving system contextual information in an encapsulated packet. The d... |
|
Invention
|
Detecting and protecting against computing breaches based on lateral movement of a computer file ... |
|
Invention
|
Systems and methods for detecting covert channels structured in internet protocol transactions. T... |
|
Invention
|
Systems and methods for executing decision trees. The disclosed computer-implemented method for e... |
|
G/S
|
design, development, and consulting services related thereto in the field of computer software an... |
|
Invention
|
Systems and methods for preventing data loss from data containers. The disclosed computer-impleme... |
|
Invention
|
Image quality optimization during remote isolated sessions. Image quality optimization during rem... |
|
Invention
|
Automated scoring of intra-sample sections for malware detection. Methods and systems are provide... |
|
Invention
|
Method to assess internal security posture of a computing system using external variables. Method... |
|
Invention
|
Systems and methods for tuning application network behavior. The disclosed computer-implemented m... |
|
Invention
|
Systems and methods for improving performance of cascade classifiers for protecting against compu... |
|
Invention
|
Systems and methods for dynamically augmenting machine learning models based on contextual factor... |
|
Invention
|
Systems and methods for protecting website visitors. The disclosed computer-implemented method fo... |
2017
|
G/S
|
Providing an Internet website portal in the field of sales
and marketing, and sales and marketin... |
|
G/S
|
Providing an Internet website portal in the field of sales and marketing, and sales and marketing... |
|
G/S
|
Downloadable software for computer security; downloadable software in the field of information se... |
2016
|
G/S
|
Computer software; computer hardware; data processing equipment; security software; computer soft... |
|
G/S
|
Business management and consulting services for the data security and information technology indu... |
|
G/S
|
Educational services; education services, namely, providing training, assessment, and simulated t... |
|
G/S
|
Educational services; education services, namely, providing on-line and simulation training in th... |
2015
|
G/S
|
Business management services, namely, providing outsource management services to others in the fi... |
|
G/S
|
Electronic storage of data; electronic document and email archiving services; technical support s... |
|
G/S
|
Computer software for use in detection of malware by executing content, analyzing file behavior a... |
2014
|
G/S
|
Computer security consultancy; computer software consulting;
computer software development; comp... |
|
G/S
|
Computer software; computer hardware; Internet security software; enterprise security software th... |
|
G/S
|
Internet security software; enterprise security software that provides security monitoring and ma... |
|
G/S
|
Computer services and computer network security services in the nature of providing malware remov... |
|
G/S
|
Computer software; cloud computing software; enterprise management software for distributing soft... |
|
G/S
|
Computer software; Computer software platforms for providing users with security alerts, security... |
|
G/S
|
Computer software for data protection and data encryption in enterprise and cloud computing envir... |
2013
|
G/S
|
Computer software and hardware; computer software downloaded from the Internet; computer software... |
|
G/S
|
Computer hardware; Computer software for computer, network, and internet security applications, c... |
|
G/S
|
Computer software; computer hardware; computer software that acts as a gateway between different ... |
2012
|
G/S
|
Cloud security software for the encryption and protection of data. Cloud computing provider servi... |
|
G/S
|
Computer software and hardware for creating, deploying, accelerating, executing and providing sec... |
|
G/S
|
Computer hardware and computer software; computer software for the management of software develop... |
|
G/S
|
Computer security service, namely, providing online non-downloadable software for scanning and sc... |
2011
|
G/S
|
Network performance diagnostics and analysis software Consulting services in the field of compute... |
|
G/S
|
Computer software for providing network, Internet, and computer security; computer software for p... |
2010
|
G/S
|
Computer software that acts as a gateway between different computer operating systems and compute... |
|
G/S
|
Computer software for providing cryptographic network security and data security functions; compu... |
|
G/S
|
Computer software, namely enterprise management software, information management software, applic... |
|
G/S
|
Computer software. Computer consulting services; computer security services, namely, restricting ... |
|
G/S
|
computer software, namely, enterprise management software for distributing software among compute... |
|
G/S
|
Computer hardware and software that minimizes bandwidth consumption, decreases latency, and facil... |
2009
|
G/S
|
Computer software the functions of which is to facilitate the collection, storage and movement o... |
|
G/S
|
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, sig... |
|
G/S
|
Computer software and computer hardware for creating and event-driven and standards-based messagi... |
2007
|
G/S
|
Computer software; computer software for use in the backup, storage, imaging and recovery of comp... |