Sophos Limited

Royaume‑Uni


 
Quantité totale PI 558
Quantité totale incluant filiales 560 (+ 2 pour les filiales)
Rang # Quantité totale PI 2 294
Note d'activité PI 3,4/5.0    470
Rang # Activité PI 1 531
Parent Sophos Holdings Limited
Classe Nice dominante Appareils et instruments scienti...

Brevets

Marques

370 69
3 8
51 11
46
 
Dernier brevet 2024 - Dynamic routing of application t...
Premier brevet 1994 - Validity checking
Dernière marque 2023 - SOPHOS XSTREAM
Première marque 1994 - SOPHOS

Filiales

1 subsidiaries with IP (0 patents, 2 trademarks)

1 subsidiaries without IP

 S'inscrire grtuitement pour accéder à la liste des filiales

Industrie (Classification de Nice)

Derniers inventions, produits et services

2023 Invention Methods and apparatus for detection of malicious documents using machine learning. An apparatus ...
Invention Systems and methods for network security. Methods, systems, and computer readable media for netw...
Invention Computer augmented threat evaluation. An automated system attempts to characterize code as safe ...
Invention Cybersecurity configuration in a cloud environment. The present teachings include automatically ...
Invention Endpoint with remotely programmable data recorder. An endpoint coupled in a communicating relati...
Invention Live discovery of enterprise threats based on security query activity. A threat management syste...
Invention Enterprise network threat detection. In a threat management platform, a number of endpoints log ...
P/S Computer hardware, namely, firewalls; Downloadable computer software for the creation of firewalls
Invention Techniques for detecting living-off-the-land binary attacks. In example embodiments, techniques a...
Invention Rapid development of malicious content detectors. Methods and systems are described for developin...
Invention Rapid development of malicious content detectors. Methods and systems are described for developi...
Invention Using reputation to avoid false malware detections. A variety of techniques are disclosed for de...
Invention Attribute relevance tagging in malware recognition. In general, in one aspect, a method for mach...
Invention Persistent ip address allocation for virtual private network (vpn) clients. Systems and methods f...
Invention Augmented security recognition tasks. A system for conducting a security recognition task, the s...
Invention Implementing a machine-learning model to identify critical systems in an enterprise environment. ...
Invention Techniques for detecting living-off-the-land binary attacks. In example embodiments, techniques ...
Invention Security threat alert analysis and prioritization. A method for prioritizing security events comp...
P/S (Based on Use in Commerce) Authentication of data in the field of e-commerce and digital payments...
Invention Security threat remediation for network-accessible devices. Various aspects related to methods, ...
Invention Restricted execution mode for network-accessible devices. Various aspects related to methods, sy...
P/S Providing online non-downloadable digital goods, namely computer software, computer hardware, ele...
Invention Secure firewall configurations. A kernel driver on an endpoint uses a process cache to provide a...
Invention Security of network traffic in a containerized computing environment. A method comprises monitori...
P/S (Based on Intent to Use) 3D spectacles; Downloadable augmented reality software for virtual reali...
Invention Centralized management of policies for network-accessible devices. Various aspects related to me...
P/S Computer software; metaverse software; utility, security and cryptography software; computer soft...
2022 Invention Dynamic routing of application traffic to ztna connectors. A cloud computing platform provides z...
Invention Hybrid appliance for zero trust network access to customer applications. A zero trust network ac...
Invention Alias domains for accessing ztna applications. A cloud computing platform provides zero trust ne...
Invention Domain ownership verification for a ztna service platform. A cloud computing platform provides z...
Invention Validation of ztna configuration for a multi-tenant proxy environment. A cloud-based platform fo...
Invention Cloud-based zero trust network access service. Infrastructure for zero trust network access (ZTN...
Invention Scaling tunnels for zero trust network access appliances. A cloud computing platform provides ze...
Invention Cloud-based zero trust network access services. Various modifications to a zero trust network acc...
Invention Systems and methods for implementing policy changes in multi-tenant environments. In one or more ...
Invention Pausing automatic software updates of virtual machines. Adapting automatic software update behav...
Invention Secure hashing of large data files to verify file identity. Secure hashing of large files to ver...
Invention Method and system for outbound spam mitigation. A method for mitigating outbound electronic messa...
Invention Security threat alert analysis and prioritization. A method for prioritizing security events com...
P/S (Based on 44(d) Priority Application) Battery chargers for mobile phones; Cases for mobile phones...
Invention Evaluating network flow risks. A cluster of network flows is formed on the basis of a particular...
Invention Catalog for managing modular code. A catalog of pipelines for modular coding integrates resource...
Invention Security compliance for modular code. A catalog of pipelines for modular coding integrates resou...
Invention Persistent ip address allocation for virtual private network (vpn) clients. Systems and methods ...
Invention Digital certificate malicious activity detection. Systems and methods for detecting malicious ac...
Invention Traffic scanning with context-aware threat signatures. Threat management devices and methods. Th...
P/S (Based on 44(d) Priority Application) Downloadable computer software for controlling and managing...
P/S Downloadable computer software, downloadable computer programs, and downloadable mobile applicati...
Invention Deduplication of endpoint images. A threat management facility for an enterprise provides securi...
Invention Methods and apparatus for machine learning to generate a decision tree database to identify comma...
P/S (Based on 44(e)) Battery chargers for mobile phones; Cases for mobile phones; Mouse pads; USB com...
P/S Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware...
P/S Computer hardware; wireless access points; computer software, computer programs, and downloadabl...
P/S Computer hardware; wireless access points; computer software, computer programs, and downloadable...
Invention Security threat monitoring for network-accessible devices. Various aspects related to threat man...
P/S Downloadable computer anti-virus software; Downloadable software for cybersecurity, namely, for s...
P/S Computer hardware, namely, for data networking; Downloadable computer software for managing, conf...
P/S Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, a...
Invention Natural language analysis of a command line using a machine learning model to generate a natural ...
Invention Methods and apparatus for visualization of machine learning malware detection models. Embodiment...
Invention Methods and apparatus for natural language interface for constructing complex database queries. ...
Invention Methods and apparatus for augmenting training data using large language models. In some embodime...
Invention Assessing behavior patterns and reputation scores related to email messages. A computer-implemen...
P/S Computer programming services for the protection of software; data security services; computer so...
P/S Software for IT infrastructure and cybersecurity automation; downloadable software for collaborat...
P/S Computer hardware; computer software; wireless access points; computer software, computer program...
P/S Downloadable electronic publications in the nature of manuals, technical documentation, brochures...
P/S Downloadable security software to provide cybersecurity protection; computer hardware; wireless a...
2021 P/S (Based on Use in Commerce) Computer security consultancy; Computer security services, namely, enf...
P/S (Based on Use in Commerce) Battery chargers for mobile phones; Cases for mobile phones; Computer ...
P/S Computer security consultancy; Computer virus protection services; Cloud computing featuring soft...
P/S Computer diagnostic services; Computer security consultancy; Computer security consultancy in the...
P/S Computer hardware; wireless access points devices namely, wireless routers; computer software, co...
P/S Computer hardware; wireless access points devices; computer software, computer programs, and dow...
P/S Outsource service providers in the field of information technology; technical advice relating to ...
P/S Outsource service providers in the field of information technology; technical advice relating to...
P/S Computer programming services for the protection of software, data security services, computer so...
P/S Computer programming services for the protection of software; data security services; computer s...